{"id":1030,"date":"2008-11-18T17:19:44","date_gmt":"2008-11-19T01:19:44","guid":{"rendered":"\/?p=1030"},"modified":"2008-11-18T17:19:44","modified_gmt":"2008-11-19T01:19:44","slug":"my-twitterank-is-10154","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1030","title":{"rendered":"My Twitterank is 101.54"},"content":{"rendered":"<p>In case you need mind-stretching with regard to credulity, try out this piece from <a href=\"http:\/\/sproutmarketing.com\/blogs\/viewpost\/197\" class=\"broken_link\">Sprout Marketing<\/a>:<\/p>\n<p style=\"padding-left: 30px;\">Madness erupted on Twitter last night, as the latest cool &#8220;app,&#8221; <a href=\"http:\/\/twitterank.com\/\" class=\"broken_link\">Twitterank<\/a>, was suddenly accused of being a simple password swiping scheme. Over the past 48 hours, thousands of people were Tweeting the same message:<\/p>\n<div style=\"padding-left: 30px; margin-left: 40px; text-align: left;\">my Twitterank is 101.54!<\/div>\n<p style=\"padding-left: 30px;\">Each one of those thousands of users freely gave out their username and password to the site. In exchange, the site uses some complicated algorithm (or not, maybe it&#39;s entirely random) and out pops a rating.<\/p>\n<p style=\"padding-left: 30px;\">Then around 3 p.m. or so, Mountain Time, PANIC broke out.<\/p>\n<p style=\"padding-left: 30px;\"><img loading=\"lazy\" class=\"caption\" title=\"TwitterPanic\" src=\"http:\/\/sproutmarketing.com\/images\/stories\/picture%203.png\" alt=\"This is how e-riots start...\" width=\"355\" height=\"81\" \/><\/p>\n<p style=\"padding-left: 30px;\">Within minutes, similar messages were everywhere. <a href=\"http:\/\/search.twitter.com\/search?q=change+your+password+twitterank\" class=\"broken_link\">This<\/a> is the online equivalent of an angry, confused mob [FOLLOW\u00a0the incredible link\u00a0&#8211; Kim] . <a href=\"http:\/\/blogs.zdnet.com\/collaboration\/?p=163\" class=\"broken_link\">ZDnet<\/a> jumped in, along with dozens of other <a href=\"http:\/\/www.guardian.co.uk\/technology\/blog\/2008\/nov\/13\/twitter-password-security\">legitimate news sources<\/a>.<\/p>\n<p style=\"padding-left: 30px;\">News is breaking out this morning that it really isn&#39;t a scam at all. Regardless, I think there are a couple lessons here.<\/p>\n<p style=\"padding-left: 30px;\">1. Twitter people need to be a lot more careful about their passwords. A lot of them use the same passwords across multiple sites. If the Twitterank person wanted, he could be posting to your blog while ordering <a href=\"http:\/\/www.garrettpopcorn.com\/store\/search.asp\" class=\"broken_link\">expensive popcorn<\/a> with your credit card.<\/p>\n<p style=\"padding-left: 30px;\">2. How trustworthy is your brand? Do people have confidence in coming to your site that if they share personal information, it&#39;ll be protected? It took eBay and Amazon years to get to this point; they were the pioneers. There are tons of sites that do e-commerce now, thanks to Amazon.<\/p>\n<p style=\"padding-left: 30px;\">Then you look at the <a href=\"http:\/\/twitterank.com\/\" class=\"broken_link\">Twitterank<\/a> site; does it instill confidence? Kind of reminds me of an old Yahoo! Geocities page. Sure, he did it late one night for kicks, and he SAYS he won&#39;t take your password&#8230;<\/p>\n<p style=\"padding-left: 30px;\">Apparently this was good enough for tons of people. But I bet they&#39;re rethinking that today.<\/p>\n<p>The average person has no way of evaluating the extent to which their passwords are in danger, especially when\u00a0presented with\u00a0two related sites that perform redirection\u00a0or ask for entry of passwords.\u00a0<\/p>\n<p>The only safe solution for the broad spectrum of computer users is\u00a0one in which they <strong>cannot give away\u00a0their secrets<\/strong>.\u00a0\u00a0In other words:\u00a0 Information Cards\u00a0(the advantage being they don&#39;t necessarily\u00a0require hardware) or Smart Cards.\u00a0\u00a0 Can there be a better teacher than reality?<\/p>\n<p>[Via Vu &#8211; Thanks]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The only safe solution for the broad spectrum of computer users is one in which they cannot give away their secrets.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,61,23,44],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1030"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1030"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1030\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}