Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

That's the thing, you can't,not with the way current tech is. But you can read up about having good monitoring/detection and hardening on your endpoints.

Microsoft for example recommenda privileged access workstations. If twitter's employees used a separate set of credentials and workstations for privileged twitter moderation than their regular account/machine used for email and day to day stuff I bet the attack wolf have failed.



There are probably Twitter employees whose job it is to reset emails all day long. Having 2 separate computers and accounts, one for for resetting emails (which is done all day) and one for responding to email sounds like quite a burden on employees. How are they going to get the name of the account from one computer to the other? Copy and paste won't work. Retyping from one computer to the other surely will result in typos.


I'd say a typo rate is an acceptable tradeoff for air-gapping privileged access.


The typos themselves could be a vector for attack. The attacker asks for a reset for one account with a capital I and maybe gets a reset for a different account with a lowercase l.


Sounds like that's a font selection issue for the admins - there are good choices of font that are unambiguous, they've been linked here.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: