All they have to do is check the IP addresses when he submitted the tweet but Twitter would have to give it up so I assume it'll somehow be deleted if they ever ask for it.
It can be near impossible to prove if they get into his device and can post it from there. Don't tell them that though. Instead ask a hacking expert for an explanation that is invalid then look at what he reads, etc his circle, drop it near him and see if he parrots it.
An XSS attack against Twitter is very unlikely, and taking full control over a device equally. This is such a transparent claim though that it should be incumbent on Twitter to validate this claim.
All they have to do is check the IP addresses when he submitted the tweet but Twitter would have to give it up so I assume it'll somehow be deleted if they ever ask for it.
It can be near impossible to prove if they get into his device and can post it from there. Don't tell them that though. Instead ask a hacking expert for an explanation that is invalid then look at what he reads, etc his circle, drop it near him and see if he parrots it.
An XSS attack against Twitter is very unlikely, and taking full control over a device equally. This is such a transparent claim though that it should be incumbent on Twitter to validate this claim.