You might like

6 Responses to Why Twitter's two-factor authentication isn't going to stop media organisations from being hacked

  1. dougmet · 867 days ago

    Wish they'd offer Google Authenticator as well (or do what Facebook does and build your own token system into the mobile app). I'm sick of giving companies my phone number.

  2. Dave · 867 days ago

    Why not just have one phone in a central location that all the staff can access (locked drawer idea)? If they had a single token (i.e. RSA) they would have to do the same thing.

    • Cameron · 864 days ago

      Because often staff aren't in a central building. They're in the field, or working from home, etc.

  3. Seems like it would be easy enough to implement in a corporate environment if they really wanted -- all you need is for the phone number that receives the code to forward it to accounts that have access. Annoying, yes, but doable if the number of tweets is modest.

    It's nuts that they actually require you to receive the code via SMS since those out of cell range but with network connections would not be able to tweet unless they have wifi calling. Apps like Google Authenticator are much better in that they can be used on multiple phones and do not require cell reception.

  4. artesea · 867 days ago

    Twitter do have a system in which users can tweet from their own accounts on behalf of the company account. However for over a year it appears to be in a closed beta.
    See the API for hints about contributors

  5. Scott Maxwell · 631 days ago

    Didn't work. See google's announcement today.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Graham Cluley runs his own award-winning computer security blog at, and is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s. Now an independent security analyst, he regularly makes media appearances and gives computer security presentations. Follow him on Twitter at @gcluley