There’s a level of anonymity here where OpSec is up to the user for the most part.
Twitter is much more connected to a lot of people’s actual identities as it was also a space for organizations, businesses and other public figures to post to the general public, with these accounts being run mostly by the public figure themselves, and PR for the really rich people and orgs. As such protections on Twitter needed to be as broad as possible.
All fences are scalable and climbable, but as the other user was saying, it’s good to make that climb harder for the bad actors in this scenario.
There’s a level of anonymity here where OpSec is up to the user for the most part.
Twitter is much more connected to a lot of people’s actual identities as it was also a space for organizations, businesses and other public figures to post to the general public, with these accounts being run mostly by the public figure themselves, and PR for the really rich people and orgs. As such protections on Twitter needed to be as broad as possible.
All fences are scalable and climbable, but as the other user was saying, it’s good to make that climb harder for the bad actors in this scenario.