Article 4S4S4 Twitter transgression proves why its flawed 2FA system is such a privacy trap

Twitter transgression proves why its flawed 2FA system is such a privacy trap

by
Dan Goodin
from Ars Technica - All content on (#4S4S4)
fail-whale-800x643.jpg

Enlarge (credit: Twitter)

If ever there was a surefire way to sour users against a two-factor authentication system that was already highly flawed, Twitter has found it. On Tuesday, the social media site said that it used phone numbers and email addresses provided for 2FA protection to tailor ads to users.

Twitter requires users to provide a valid phone number to be eligible for 2FA protection. A working cell phone number is mandatory even when users' 2FA protection is based solely on security keys or authenticator apps, which don't rely on phone numbers to work. Deleting a phone number from a user's Twitter settings immediately withdraws an account from Twitter 2FA, as I confirmed just prior to publishing this post.

login-verification-off-640x333.png

Security and privacy advocates have long grumbled about this requirement, which isn't a condition of using 2FA protection from Google, Github, and other top-ranked sites. On Tuesday, Twitter gave critics a new reason to complain. The site said it may have inadvertently used email addresses and phone numbers provided for 2FA and other security purposes to match users to marketing lists provided by advertisers. Twitter didn't say if the number of users affected by the blunder was in the hundreds or the millions or how long the improper targeting lasted.

Read 9 remaining paragraphs | Comments

index?i=I30rRUMifFw:9OnfW5G0kq8:V_sGLiPB index?i=I30rRUMifFw:9OnfW5G0kq8:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments