With Twitter in chaos, some methods for account safety

With Twitter in chaos, some ways to protect your account
The Twitter emblem is seen on the social media firm’s headquarters in San Francisco on Friday, Nov. 11, 2022. Credit score: Stephen Lam/San Francisco Chronicle through AP

Twitter in chaos. Elon Musk, its new proprietor, has decimated its workers and this week gave these remaining an ultimatum—work grueling hours and be “extraordinarily hardcore ” or depart. Tons of selected the latter and headed for the door.

There are already indicators that the exodus is stressing the system. Some customers seen issues receiving texts to sign up with two-step verification. Check pages are exhibiting up within the wild. Some customers are seeing a renewed barrage of spam in direct messages and on their feed, whereas others complain of receiving new replies to long-deleted tweets and seeing saved tweet drafts disappear. Nonetheless, the hen website is chugging alongside.

Twitter will not merely shut down in a single day. However safety consultants warn that the drastic job cuts could could open the door to dangerous actors exploiting the platform’s vulnerabilities and compromising consumer accounts.

Whereas there’s not a lot you are able to do about Musk’s on-the-fly teardown of one of many world’s key on-line info ecosystems, there are steps to guard your account if you happen to, like thousands and thousands of different Twitter customers, aren’t able to flee the coop in seek for another.


If you happen to solely use your login and password to sign up to Twitter, it is vital, particularly now, so as to add an additional step to the method so it turns into harder for hackers to entry your account.

Twitter has three strategies to select from: Textual content message, an authentication app or a safety key. Since there have been some glitches with customers not receiving textual content messages to authenticate their accounts. Since it’s typically thought of a safer choice, utilizing the authentication app might be your finest wager.

To do that, you will have to obtain considered one of quite a lot of out there purposes to your gadget. They’re free within the Apple or Android app shops and a few examples embrace Google or Microsoft Authenticator, Authy, Duo Cell and 1Password.

After getting the app, open the desktop model of Twitter and click on on the icon exhibiting ellipses in a circle. There, you will discover “Settings and privateness” then “Safety and account entry” and eventually, “Safety.” Right here, you may choose ” Authentication app” and comply with the directions to set it up. Twitter will ask you to share your e-mail deal with to do that, you probably have not already.

As soon as you might be all set, you should use the auto-generated numeric codes out of your authentication app so as to add an additional layer of safety when logging in to Twitter.


Jane Manchun Wong, an impartial software program and safety researcher in Hong Kong who follows Twitter carefully, recommends revoking permissions to third-party websites and apps by way of your Twitter account.

That is as a result of if there’s a potential safety drawback with Twitter’s API (or Utility Programming Interface, which lets third events entry Twitter information to create apps that work with Twitter, for example) with fewer individuals working on the firm, patching it up will inevitably take longer.

To show off this characteristic, begin within the “Safety and account entry” device and go to “Apps and classes.” Right here, it’s best to discover all of the third-party apps which have are linked to your Twitter account—together with some you might have linked years in the past that not exist—and you’ll revoke entry to every one.


For the nostalgic, for analysis or for the digital hoarders amongst us, the thought of dropping a decade or extra of our tweet historical past is a disaster. Worry not, although. It would take a while, however you may obtain your Twitter “archive” if you would like to make sure it is preserved—simply in case.

As with different extra complicated options, this device is barely out there on the desktop model of Twitter, within the “Your account” part of settings. You’ll have to enter your password once more and undergo two-factor authentication you probably have that arrange. When your archive is able to obtain, you’re going to get a notification on Twitter.

Once more, you’ll have to obtain it on the desktop model of the positioning. Whereas usually this course of takes about 24 hours, it might take longer now. Some customers have additionally reported having to attempt greater than as soon as.


Whereas there isn’t any good substitute for Twitter—and naturally Twitter continues to be right here!—many customers, particularly these in journalism, tech and academia, are signing up for Mastodon, a beforehand little-known platform that launched in 2016. Mastodon is a decentralized social community. Which means it is not owned by a single firm or billionaire. Fairly, it is made up of a community of servers, every run independently however in a position to join so individuals on completely different servers can talk.

Signing on could be difficult—you will have to choose a “server” to affix, however no matter which one you select, you may nonetheless talk with individuals on different servers, form of like how one can e-mail individuals out of your Gmail account even when they’re on Outlook or one other e-mail server.

When you’re in, you may go to and discover your Twitter following or any Twitter lists you might need to see if additionally they have Mastodon accounts. Many Twitter customers are additionally itemizing different social networks and content material info of their bios and even Twitter show names so individuals can get in contact with them—simply in case.

© 2022 The Related Press. All rights reserved. This materials is probably not printed, broadcast, rewritten or redistributed with out permission.

Quotation: With Twitter in chaos, some methods to guard your account (2022, November 18) retrieved 19 November 2022 from

This doc is topic to copyright. Aside from any honest dealing for the aim of personal research or analysis, no half could also be reproduced with out the written permission. The content material is offered for info functions solely.


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

We use cookies to give you the best experience. Cookie Policy