Twitter has a new whistleblower, as another former employee has sounded the alarm about security issues, according to The Washington Post. The new complainant, who has spoken with Congress and the Federal Trade Commission (FTC), says any Twitter engineer still has access to an internal program — formerly called “GodMode” — that lets them tweet from any account.
The whistleblower’s complaint alleges GodMode (now renamed to “privileged mode”) remains on the laptop of any engineer who wants it, requiring only a production computer and a simple code change from “FALSE” to “TRUE.” Screenshots of the code, included in an October complaint filed with the FTC, show a warning to anyone attempting to use it: “THINK BEFORE YOU DO THIS.”
This isn’t the first time Twitter security has drawn scrutiny. In 2020, teenage crypto scammers hacked the company’s internal systems, sending fake tweets from the accounts of President Joe Biden, Barack Obama, Musk and others. Twitter’s at-the-time executives said they had fixed the issue and launched a “comprehensive information security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of nonpublic consumer information.”
However, Twitter’s first whistleblower, Peiter Zatko, disputed that. Another engineer claimed at the time that GodMode was still widely available.
The new complainant’s filing says the incident led to Twitter reopening the case, which sparked the discovery that engineers could also delete or restore anyone’s tweets. (Regular Twitter users can’t do either.) He also claims Twitter can’t log who, if anyone, uses or abuses any of the special privileges.
The new whistleblower’s complaint was filed by Whistleblower Aid, the same nonprofit firm representing Zatko. The FTC is reportedly interviewing former Twitter employees about the allegations.
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission. All prices are correct at the time of publishing.
Source: www.engadget.com