One Article Review

Accueil - L'article:
Source ErrataRob.webp Errata Security
Identifiant 439381
Date de publication 2017-11-24 03:02:11 (vue: 2017-11-24 03:02:11)
Titre A Thanksgiving Carol: How Those Smart Engineers at Twitter Screwed Me
Texte Thanksgiving Holiday is a time for family and cheer. Well, a time for family. It's the holiday where we ask our doctor relatives to look at that weird skin growth, and for our geek relatives to fix our computers. This tale is of such computer support, and how the "smart" engineers at Twitter have ruined this for life.My mom is smart, but not a good computer user. I get my enthusiasm for science and math from my mother, and she has no problem understanding the science of computers. She keeps up when I explain Bitcoin. But she has difficulty using computers. She has this emotional, irrational belief that computers are out to get her.This makes helping her difficult. Every problem is described in terms of what the computer did to her, not what she did to her computer. It's the computer that needs to be fixed, instead of the user. When I showed her the "haveibeenpwned.com" website (part of my tips for securing computers), it showed her Tumblr password had been hacked. She swore she never created a Tumblr account -- that somebody or something must have done it for her. Except, I was there five years ago and watched her create it.Another example is how GMail is deleting her emails for no reason, corrupting them, and changing the spelling of her words. She emails the way an impatient teenager texts -- all of us in the family know the misspellings are not GMail's fault. But I can't help her with this because she keeps her GMail inbox clean, deleting all her messages, leaving no evidence behind. She has only a vague description of the problem that I can't make sense of.This last March, I tried something to resolve this. I configured her GMail to send a copy of all incoming messages to a new, duplicate account on my own email server. With evidence in hand, I would then be able solve what's going on with her GMail. I'd be able to show her which steps she took, which buttons she clicked on, and what caused the weirdness she's seeing.Today, while the family was in a state of turkey-induced torpor, my mom brought up a problem with Twitter. She doesn't use Twitter, she doesn't have an account, but they keep sending tweets to her phone, about topics like Denzel Washington. And she said something about "peaches" I didn't understand.This is how the problem descriptions always start, chaotic, with mutually exclusive possibilities. If you don't use Twitter, you don't have the Twitter app installed, so how are you getting Tweets? Over much gnashing of teeth, it comes out that she's getting emails from Twitter, not tweets, about Denzel Washington -- to someone named "Peaches Graham". Naturally, she can only describe these emails, because she's already deleted them."Ah ha!", I think. I've got the evidence! I'll just log onto my duplicate email server, and grab the copies to prove to her it was something she did.I find she is indeed receiving such emails, called "Moments", about topics trending on Twitter. They are signed with "DKIM", proving they are legitimate rather than from a hacker or spammer. The only way that can happen is if my mother signed up for Twitter, despite her protestations that she didn't.I look further back and find that there were also confirmation messages involved. Back in August, she got a typical Twit
Envoyé Oui
Condensat 000 2011 able about accidentally account accounts added address again ago all already also alternative always another anti any anything app appears are argue around ask attempts august back bad because been behind being belief bit bitcoin both bottom brought but button buttons called can carol: case caused certain chance changing chaotic charities cheer classes clean clear clicked college com comes coming community computer computers configured confirm confirmation confirmations confirmed contents continued continuing control controversial convince copies copy correctly corrupting could couple create created daily deeper deleted deleting denzel describe described description descriptions despite did didn difficult difficulty disputed dkim doctor does doesn dog don done driven dug duplicate easily eight email emails emotional emphatically engineers enthusiasm error even every evidence example except exclusive excuse exist exists explain explanation eyed failed family fault feature find five fix fixed flow forever from fully further geek get getting gives gmail gnashing goes going good got gotten grab graham great group growth hacked hacker had hadn hand happen has have haveibeenpwned having help helping her here holiday how impatient inbox incoming indeed induced initially insisting installed instead instructs interrogated involved irrational it: joining just keep keeps know knows last leaving legitimate life like little log logged login long look lost lot made mailbox majority make makes making march math maybe mean means message messages might mine missed misspelled misspellings mistake mom moments months more moreover mother mouth much must mutually myself name named naturally needs never new next not nothing notifications now obvious one only onto open opening opens option otherwise out over own page part particulars password paused peaches people phone point possibilities problem problems process processing prolific proof protest protestations prove proving raising rather rational really reason reasonable reasons received receiving recognized reconfigured regardless relatives resend reset resolve retired right routine ruined said sanctimonious saw say saying saying: science screwed securing see seeing seem selection send sending sense server several she show showed signed signup silence since six skin small smart solution solve some somebody somehow someone something son sort spammer spelled spelling spirits start state steps story stupid such support sure swore take tale technically teenager teeth terms texts than thanksgiving that them then there these thing think those through time tips today took topics torpor touching trending triaging tried trump tumblr turkey turned tweets twitter typical unable unconfirmed understand understanding unfold untrustworthy use user using vague very volunteers washington wasn watched way website weird weirdness well went what when where which who why wise with: without words would wouldn wrong years yet your
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: