1564
Comments (19)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
4
AnyDad 4 points ago +4 / -0

An XSS attack against Twitter is very unlikely, and taking full control over a device equally. This is such a transparent claim though that it should be incumbent on Twitter to validate this claim.

2
muslimporn 2 points ago +2 / -0

He'll just say he left it on the table for a moment unlocked in the bar and someone grabbed it or something. Your mistake is to try to think of the implausible. You need to think of the plausible.

Also ANY hack such as some browser exploit or anything that lets partial or complete access (code injection usually of some sort) will tend to do the trick.

XSS sounds like you have frontend only experience when there's a wealth of attack vectors.

There are so many possibilities where do I even begin? Just used the same creds everywhere? By now I assume twitter mitigates that with rate limiting and device detection but who knows I'm not gay so I never used twitter.

If I ever turn gay and fancy a bit of cottaging then I'll give twitter a go since the only thing it seems to be about is opening ones mouth.

Trump being exempt.

Also just because it's possible doesn't make it so. I mean technically the dog can eat your homework but we all know one way or another that's dogshite.

1
Detective51 [S] 1 point ago +1 / -0

A phone knows when it’s been raised or laid down. Any data it inputs from it’s accelerometer is recorded in the device. That would be discoverable in a forensic examination. So an examination could tell if he just put his phone down or not. Also, you can compare typing patterns.
iPhone has programing that learns and improves its type response accuracy based upon how you type. It knows where your thumb most often touches a letter and even though everything looks all neat and lined up on our end of things, it adjusts the letters slightly to make sure we more accurately touch the letter we are trying to touch. There are many options to investigate when it comes to phone usage, even if something seems impossible to figure out or something appears easy to pass off as never being able to find out, there is always evidence to explore and document when it comes to electronic usage. Even the speed at which you type can be compared to the speed of when something else was typed. This can be shown as evidence of common or uncommon activity. Even if it’s just circumstantial evidence, it’s still evidence.

1
muslimporn 1 point ago +1 / -0

The problem here is the same as the DNC hack. We don't have custody of the evidence. No one can investigate it in the way you suggest.

You're best bet is to just get them to speak as they manufacture excuses and evidence. They wont fully know what's plausible or not.

Catch them in a lie or mistruth.