![]() ![]() I’m not sure I’m ever going to know the answers to these questions, but I’m leaving the tweet up there in hopes that it will provide some clues - and with the belief that the villain in the story, if ever brought to justice, will be a member of the shadowy cabal that I have fought my entire career: busted software. Some questions I have, that I don’t know enough about the Twitter API to answer: first, how are tweets created that refer to media entities from other tweets? i.e., is there something about that tweet that can give a better clue as to how it was generated? Does the fact that it’s geolocated to San Francisco (albeit with the broadest possible coordinates) indicate that it might have come from the Twitter client misbehaving on my phone? (I didn’t follow Matthew Anderson and my phone was on my desk when this was tweeted - so this would be the app going seriously loco.) And what I’m most dying to know: what other tweets refer to the photos from the tweet from Matthew? (I gather that DataSift can answer this question, but I’m not a DataSift customer and they don’t appear to have a free tier.) If there’s a server-side bug afoot here, it wouldn’t be surprising if I’m not the only one affected. Why would someone who had just hacked my account burn it by tweeting an innocuous (if idiosyncratic) photo of campaign posters on the streets of Berlin?! Suddenly this is feeling less like I’ve been hacked, and more like I’m the victim of data corruption. Note in particular that the media has a source_status_id_str of 775378264772775936 it’s from this tweet roughly an hour before mine from Matt Anderson, the BBC Culture editor who (I gather) is Berlin-based. "profile_sidebar_border_color": "C0DEED", When two tiles with the same number touch. ![]() How to play: Use your arrow keys to move the tiles. "profile_background_image_url_https": "", Join the numbers and get to the 2048 tile Keep going Try again. "time_zone": "Pacific Time (US & Canada)", "description": "Nom de guerre: Colonel Data Corruption", Looking at the raw tweet, however, cleared up its source: ![]() There was no caption - just the two images from what I gathered to be Germany. Then there was the oddity of the tweet itself. (And according to Twitter, I have only used the one device to access my account.) The only intervening logins were two from Quora about an hour prior to the tweet. Starting value: Created by Gabrixele Cirulli. Just type in the value below and start playing. Alternatively, you could also set the starting value to a strange number or a word and see what happens. In terms of figuring out where the malicious tweet had come from, the source of the tweet was “Twitter for Android” - but according to my login history, the last Twitter for Android login was from me during my morning commute about two-and-a-half hours before the tweet. 2048 Plus hacked, Infinite props., Combine the same numbered blocks together as you attempt to fill the board with 2048 blocks. The 2048 Hack Version lets you set the value of the generated tiles, allowing you to beat all of their scores. Other than the tweet, I (thankfully!) didn’t see any obvious additional damage: no crazy DMs or random follows or unfollows. With my account obviously hacked, I went into fight-or-flight mode and (thanks in no small part to Bridget’s calm presence) did the obvious things: I changed my Twitter password, revoked the privileges of all applications, and tried to assess the damage… There was just one problem: I didn’t tweet it. Source:=824&name=image05.Early this afternoon, I had just recorded a wide-ranging episode of Arrested DevOps with the incomparable Bridget Kromhout and noticed that I had a flurry of Twitter mentions, all in reaction to this tweet of mine. Source: Public key certificate - Wikipedia Source: Suites: Ciphers Algorithms and Negotiating Security Settings Source: Distributary channels in the fluvial to tidal transition zone Source:=1080&ssl=1 Google Classroom - Teacher Tech Source: Douchebag Workout 2 Unblocked Games At School Googlesites Source: Hacking Exposed - Linuxpdf - Department of Electrical Engineering Source: F5 Networks TMOS Administration Study Guide by F5 Books - issuu How to Encrypt a Document Stored on Google Drive Tired of all your friends doing better than you at 20 Hack Version lets you set the value of the generated tiles, allowing you to beat all of. ![]()
0 Comments
Leave a Reply. |