X Under Siege: Data Leaks, Bots, and Security Failures

X Under Siege: Data Leaks, Bots, and Security Failures

Features a conversation with Alberto Daniel Hill and his friends, where Alberto asserts that Twitter (now known as X) is "completely compromised".


The core of Alberto's concern stems from an alleged GitHub hack that specifically targeted the Twitter repository, impacting entries for the Chirp contest. He explains that an AI system called Co-pilot, owned by Microsoft and Open AI, was trained on open-source data and is somehow involved. This situation led to the leak of API keys from over 3,200 apps. While API keys are generally meant to allow applications to interact with Twitter's content, Alberto suggests that this leak could enable malicious actors to hijack accounts, even those with two-factor authentication. Such a compromise could allow them to create or take over verified accounts belonging to major news stations or public figures, subsequently promoting fake news, manipulating markets, or running cryptocurrency scams.

This alleged vulnerability is particularly alarming due to Twitter's significant role as a news source. Alberto highlights that 90% of people trust Twitter most for news, especially breaking news. This trust makes the platform a powerful tool for manipulation, as forcing specific news into users' feeds could effectively change who people vote for in elections. He calls this "major" and capable of "literally changing the news in countries".

The security concerns on X extend beyond just leaked API keys. Forbes reports that 200 million X user records were released by a "data enthusiast" named ThinkingOne, building upon a January 2022 vulnerability that allowed access to user data via email or phone number. ThinkingOne claims that 2.8 billion records were exfiltrated, potentially making it the "largest social media breach ever". This extensive dataset includes sensitive profile metadata such as:

  • X screen names and user IDs
  • Full names and locations

The platform is also grappling with a significant bot problem. Estimates vary widely, with some posts from early 2025 suggesting that 60% to 85% of accounts could be bots, while others peg it around 15% or 64%. These bots, particularly the malicious ones, are implicated in:

  • Spreading fake news and misinformation
  • Manipulating public opinion and political propaganda
  • Engaging in scams and spamming
  • Causing ad sales volatility and diminishing advertisers' return on investment

Twitter, under Elon Musk's leadership, has undergone numerous changes, with rules and policies shifting frequently. While Twitter has implemented measures like detecting and suspending malicious bot accounts and introducing bot labels for transparency, a former security chief, Peiter Zatko, alleged "extreme, egregious" cybersecurity vulnerabilities, claiming that nearly half of Twitter's employees had access to critical software, making it highly susceptible to hacks. He also alleged that Twitter misled the public about the number of fake accounts and bots on its platform. The Political Studies Association asserts that despite Twitter's efforts, these measures are "not enough" because sophisticated bots can bypass safeguards, and even simple bots can survive for thousands of tweets. Furthermore, the sheer volume of automated content makes it nearly impossible for humans to correct all false information, and corrections may not be seen due to the platform's structure.

The constant issues, including data breaches, bot proliferation, and the potential for information warfare, contribute to a sense of frustration and skepticism among users and even insiders, as conveyed by Alberto. Despite Twitter's claims of taking privacy seriously and implementing new policies, critics argue that the actual fixes are either too slow or indicative of a deeper issue, possibly even incompetence or a desire for manipulation. This situation leaves the platform's integrity and its role as a reliable source of information in question.




ALBERTO DANIEL HILL

https://x.com/ADanielHill

https://linktr.ee/adanielhill


Jaksot(865)

ASYMMETRIC STRATEGY AND THE MEXICAN CYBER CRISIS INCLUDING BEPRIME

ASYMMETRIC STRATEGY AND THE MEXICAN CYBER CRISIS INCLUDING BEPRIME

The provided sources document the professional brand and activism of Alberto Daniel Hill, a cybersecurity expert known as the "Digital Knight" who specializes in asymmetric warfare against powerful in...

21 Huhti 6min

BE PRIME y acciones legales a PERIODISTAS e INVESTIGADORES DE CYBERSEGURIDAD libertad de expresion en MEXICO

BE PRIME y acciones legales a PERIODISTAS e INVESTIGADORES DE CYBERSEGURIDAD libertad de expresion en MEXICO

El documento es la grabación de un espacio de audio (fechado el 19 de abril de 2026) en el que varios expertos en ciberseguridad y comentaristas exponen una grave crisis de hackeos, vulnerabilidades y...

20 Huhti 29min

Investigation Report: The Be Prime Breach and the Strategy of Intimidation

Investigation Report: The Be Prime Breach and the Strategy of Intimidation

Forensic Context: The Reality of the Digital CompromiseIn high-stakes crisis management, the most terminal error a corporation can commit is the failure to align its official narrative with forensic r...

19 Huhti 59min

Bank Sicarios Mexico Gamble. (ESPAÑOL)

Bank Sicarios Mexico Gamble. (ESPAÑOL)

These sources present a fictional narrative of asymmetric warfare between a corrupt Mexican politician and a real-life ethical hacker, Alberto Daniel Hill. The story is told from the perspective of a ...

19 Huhti 23min

Bank Sicariios Mexico Gamble.

Bank Sicariios Mexico Gamble.

This isn't just a podcast episode; it's a digital explosion that will blow your mind and leave you questioning everything you know about power and money in Mexico! Tonight, we expose the shocking, rea...

19 Huhti 14min

Watching the watchers get hacked

Watching the watchers get hacked

The provided text captures a wide-ranging, personal narrative from Alberto Daniel Hill, a cybersecurity expert discussing his professional history, legal struggles, and current industry observations. ...

17 Huhti 5min

The BePrime Breach and Zero Trust

The BePrime Breach and Zero Trust

Recent reports and technical analyses detail a significant cybersecurity breach affecting BePrime, a Mexican firm specializing in digital infrastructure and security. Investigations reveal that a thre...

16 Huhti 33min

 El cazador cazado: El hackeo masivo a BePrime y el espionaje en tiempo real

El cazador cazado: El hackeo masivo a BePrime y el espionaje en tiempo real

Aquí tienes una propuesta de descripción para tu episodio de podcast en Spotify, basada en la información de tus fuentes:Título sugerido: El cazador cazado: El hackeo masivo a BePrime y el espionaje e...

16 Huhti 23min

Suosittua kategoriassa True crime

jaljilla
maanantaimysteeri
murhan-anatomia
palmujen-varjoissa
i-dont-like-mondays
backmanholmavuo
kurja-juttu
rss-jaljilla
viimeinen-havainto
piinan-kirous-2
paha-syntyi-pohjolassa-bonuskausi
rss-murhan-anatomia
rss-maanantaimysteeri-2
se-voisin-olla-mina
rss-paha-syntyi-pohjolassa
huijarit
rss-palmujen-varjoissa
rss-en-ehka-halua-tietaa
motiivina-mustasukkaisuus
sattuman-vaara