【sex squirt video】
For dissidents around the globe,sex squirt video Twitter remains the tool of choice for speaking out against their repressive governments.
With that in mind, it's easy to see why today's announcement from the social media company is so troubling. Twitter, in a Monday blog post and corresponding statement, announced it had discovered that "bad actors" with possible state-sponsored connections had found a way to tie phone numbers to Twitter accounts en masse.
In other words, a hacker using this exploit could potentially reveal the identity of a person tweeting under a pseudonym who has their account tied to a phone number. Or, alternatively, it's worth remembering that determining the phone number connected to an account is often a crucial step in hacking it.
You May Also Like
"On December 24, 2019 we became aware that someone was using a large network of fake accounts to exploit our API and match usernames to phone numbers," reads the Twitter blog post. "While we identified accounts located in a wide range of countries engaging in these behaviors, we observed a particularly high volume of requests coming from individual IP addresses located within Iran, Israel, and Malaysia."
With Saudi Arabia's documented real-world harassment of dissidents, for example, it's easy to see how such exploits could lead to real-world harm.
"It is possible that some of these IP addresses may have ties to state-sponsored actors," continued the blog post.
We've reached out to Twitter to determine how many users were affected and if the company planned to notify users whose phone numbers were tied to accounts in the manner described. We've received no immediate response at present.

Importantly, not everyone was vulnerable to this specific exploit. According to Twitter, the bad actors in question could only tie your account to a phone number ifyour account met two specific criteria.
SEE ALSO: Jeff Bezos tweets reminder that Saudi government murdered a journalist
First, you had to have added a phone number to your account. However, with many people doing that very thing to enable two-factor authentication, a lot of folks fall into that bucket. Secondly, and this should narrow things down a bit, you must have selected the "Let people who have your phone number find you on Twitter" option.
Now would be a good time to make sure you don'thave that setting enabled. It would also be a great time for Twitter to consider removing it altogether.
UPDATE: Feb. 3, 2020, 2:27 p.m. PST: A Twitter spokesperson responded to our request for comment with the following statement:
As explained in our Privacy Center blog, we recently became aware that someone was using a large network of fake accounts to exploit our API and match usernames to phone numbers. After our investigation, we immediately fixed the issue by making a number of changes to the specific API endpoint that was being exploited. We also suspended any account we believe to have been engaged in this behaviour. Protecting the privacy and safety of the people who use Twitter is a top priority and we remain focused on stopping any abuse of Twitter’s features as quickly as possible.
Topics Cybersecurity Privacy X/Twitter
Search
Categories
Latest Posts
Best Presidents' Day deal: Save $250 on Peloton Bike
2025-06-27 01:38Schiele, Shoes, and Kavanaugh by Larissa Pham
2025-06-27 01:29The Surprising Story of Eartha Kitt in Istanbul by Hilal Isler
2025-06-27 00:02Hooker’s Green: The Color of Apple Trees and Envy by Katy Kelleher
2025-06-26 23:46Popular Posts
How to Get Your Significant Other Into Gaming
2025-06-27 01:41My Withered Legs by Sandra Gail Lambert
2025-06-27 01:30The Sad Boys of Sadcore by Kristi Coulter
2025-06-27 01:18Featured Posts
Best Amazon deal: Save 20% on floral and botanical Lego sets
2025-06-27 01:32Redux: The Whims of Men by The Paris Review
2025-06-27 01:32Staff Picks: Wedding Woes and Mutual Hatred by The Paris Review
2025-06-27 00:43Deana Lawson: A Preview by Deana Lawson
2025-06-26 23:48Amazon CEO tries to sell kids on working on the moon
2025-06-26 23:29Popular Articles
The Most Selfish Choice
2025-06-27 01:28Leonor Fini: Theatre of Desire by The Paris Review
2025-06-27 00:03Cracked Fairy Tales and the Holocaust by Sabrina Orah Mark
2025-06-26 23:46Optogenetics: A Virtual Reality System for Controlling Living Cells
2025-06-26 23:14Newsletter
Subscribe to our newsletter for the latest updates.
Comments (7512)
Culture Information Network
New 'browser syncjacking' cyberattack lets hackers take over your computer via Chrome
2025-06-27 01:14Dynamic Information Network
The Surprising Story of Eartha Kitt in Istanbul by Hilal Isler
2025-06-27 00:09Unique Information Network
Always a Tough Guy at Heart by Tadao Tsuge
2025-06-26 23:17Mark Information Network
James Joyce’s Baby Talk (and Swift’s and Lear’s) by Anthony Madrid
2025-06-26 23:04Reality Information Network
New 'browser syncjacking' cyberattack lets hackers take over your computer via Chrome
2025-06-26 23:00