Delivery-Date: Sat, 14 May 2016 05:23:22 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id BC7C51E034E;
	Sat, 14 May 2016 05:23:19 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3A2F539249;
	Sat, 14 May 2016 09:23:17 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id BAD4C394C0
 for <tor-talk@lists.torproject.org>; Sat, 14 May 2016 09:23:13 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id NAXdRrCp5XSK for <tor-talk@lists.torproject.org>;
 Sat, 14 May 2016 09:23:13 +0000 (UTC)
Received: from mail.openmailbox.org (mail.openmailbox.org [62.4.1.34])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 8E2E33892B
 for <tor-talk@lists.torproject.org>; Sat, 14 May 2016 09:23:13 +0000 (UTC)
Received: by mail.openmailbox.org (Postfix, from userid 20002)
 id 2ACC020356B; Sat, 14 May 2016 01:54:37 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1463183677;
 bh=MbPnQfGNlY8Q0V8hitzqWcCtpEcLSv7zHOIkmb0op/U=;
 h=From:Subject:To:Cc:Date:From;
 b=gXuZkL2Ck4JQNkIQAV15Cl0ADs0kad9uwh0/IsV/1dQYEkWiQ/kN331YVixIIdzOv
 48RyDc0XyFivJkr8kdshEqhZVzBPy3pmeghR0MnPGPl2/XFBX/KyYVgE81waUpG/Hv
 wC3vaBgC3MFL2ab42/XdiGPcyJp/0+D5NsBIpTYI=
Received: from 127.0.0.1 (tor-exit.mensrea.org [104.232.3.33])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 (Authenticated sender: nusenu@openmailbox.org)
 by mail.openmailbox.org (Postfix) with ESMTPSA id DA779203576;
 Sat, 14 May 2016 01:54:31 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1463183675;
 bh=MbPnQfGNlY8Q0V8hitzqWcCtpEcLSv7zHOIkmb0op/U=;
 h=From:Subject:To:Cc:Date:From;
 b=Ov3PVSYlxnLvjnQ2IKO8gdxHce4rQOhYnhAzYGVqdeaVoYP1JaEDFKaUt9GRdNNu2
 gHlU5oy+QWnJI0GtZS6WzyX9yLNAOUllXw/B/fQWAtDmY8suJSFkTW0rByh1N8tvL/
 AMuLg1aHl4BrxoAs3puUoZQt/fB00HxJ/iMwT5MU=
From: nusenu <nusenu@openmailbox.org>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
X-Enigmail-Draft-Status: N1110
Message-ID: <3772afaa-fc09-75f8-755f-6336e0fe9f39@openmailbox.org>
Date: Fri, 13 May 2016 23:54:20 +0000
MIME-Version: 1.0
Subject: [tor-talk] OT: twitter account vs. phone number
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============4412734617039019179=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4412734617039019179==
Content-Type: multipart/signed; micalg=pgp-sha512;
 protocol="application/pgp-signature";
 boundary="GeqW2Lo5bj0djLwjlduksQjjJINL3KvmD"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--GeqW2Lo5bj0djLwjlduksQjjJINL3KvmD
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi,

even though this is not directly about Tor I'm asking this question here
because I assume there are many privacy-conscious people on this list
and maybe someone has a solution for this privacy problem - or some
contact at twitter ;)
(I'm also CC'ing Kate due to a recent news article [1] about the Tor
Project being in contact with Twitter about becoming more
tor-friendly, maybe the phone number requirement can be brought up there
as well).

Also the Tor Project seems to (indirectly) create incentives to use
twitter (with accounts) by requesting DMs if someone wants to get more
details about something [2].

Why would someone have a problem sharing its phone number with twitter?
maybe there is no phone? or maybe the attack surface should be kept at a
minimum by not sharing the phone number with twitter so no one can steal
it from them [3]?

Using google voice numbers for verification [4] does not work
because creating a google account requires also a phone number in the
first place.
Using random SMS receive websites [5] does not work either because these
numbers are usually already used by other twitter accounts and you might
not like giving your twitter account to some random website by using
their number.
Trying to reach out to twitter support seems also pointless since that
is apparently a bot only.

Thoughts?

thanks!
https://twitter.com/nusenu2 (locked)



[1] https://www.dailydot.com/politics/tor-twitter-facebook-privacy/
[2] https://twitter.com/torproject/status/717126806650925056
[3]
https://motherboard.vice.com/read/twitter-told-a-bunch-of-users-they-may-=
be-targets-of-a-state-sponsored-attack

[4]
https://woorkup.com/how-to-bypass-the-twitter-phone-verification-for-new-=
account/

[5]
http://sourcedigit.com/3466-bypass-smsmobile-verification-online-website/=




--GeqW2Lo5bj0djLwjlduksQjjJINL3KvmD
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXNmkwAAoJEFv7XvVCELh0L34P/3Z8kyAYt6L00udTVY7d1XDS
XyBv/qHvw4wqnyIdZOtIuwFer/DxqpdBNjJDCmVYeoCkwPB65fEV/uOOz2tnsFBp
oBqrZ1c9fPTyreWVvZS62xHjXlfXgT0KGhCZKoJvglRcYS0cQqQ9PPsA/r9Jo6Rr
bDSF74lv+prOjfxuf+YVe21IYfth58m+E5yt18l4qYXcS+UUh88O+H1UF5wOfhoW
rF4vds4H/6wwE1tRjaWQeRspNpVGPx0byOIoPhjoU/nYU55FFwa/lZfpb6+abs2v
SY+L1pGBkyMPT6gcXgdp4ph5npdH5RixJJbYbll0ByfIAVHNlF/+lmRSllB6wk04
Id6dOcqwX/LRLohkiqcXcR78/QSm7qrinb6W45Yk0lr6yGrkrOHmwxLUEzwPegfa
MQ5DZjm8tunsMSQTVBrf+DEKYyXBJDfZfrx9zC4+1ONmVhQXQ9Qilc5VP09z6p7n
XJIPMCV5hq4GxupSQtPD/yY7kFc9q7iflqS+GUZCGM6dvVI9hYCq+fxyV0pSCbUc
I1zjRBnJp5Kwa6FmOBNc2Tfhn15EzHTzLdKRllGD0kA1GVUwGgu9fG8L/noMoANt
T/HQDQUsYUMjnH51niMrwjc5WQBE/ivW025cgRtNYVLGpMWEnXPoBtjzWS3e1sBO
bCiU9KA38yZhgyBY42eF
=1+oQ
-----END PGP SIGNATURE-----

--GeqW2Lo5bj0djLwjlduksQjjJINL3KvmD--

--===============4412734617039019179==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============4412734617039019179==--

