A hammer or a microwave for a couple seconds can fix that. (Be careful with the microwave and the hammer, for that matter.)
Hi boss! Iâm not really at a funeral Iâm motorboating some guy dressed as a genderbent Powergirl, in the middle of a Deadpool conga-line!
I love #NYCC!
#faceplant
I suspect that the twitter zombie goes on regardless of what you do with your badge - log on to your twitter and dis-enable the NYCC app permissions.
They seem to have stopped doing itâ From Mashable:
UPDATE, Oct. 11, 10:55 a.m. ET: A representative sent Mashable the following statement:
As you may have seen yesterday, there were some posts to Twitter and Facebook issued by New York Comic Con on behalf of attendees after RFID badges were registered. This was an opt-in function after signing in, but we were probably too enthusiastic in our messaging and eagerness to spread the good word about NYCC. We have since shut down this service completely and apologize for any perceived overstep. Please accept our apologies and have an absolutely excellent time this weekend. -Your friends at NYCC
Why is this even possible? Facebook has the same problem where people âlikeâ a company and that somehow gives the company permission to post in that personâs name. Who in the world thinks this is a good idea?
Iâm sure companies think itâs a good idea until they get bad press for it, assuming they do. At least some of the crap Facebook pulls is unintentionally funny, though. At one point an ad popped for for me that said, âSexy singles in your area are looking for you!â There was a picture of a âsexy singleâ who was a friend of mine, who was 1) married and 2) used a caricature portrait as his profile pic.
ZOMG! Posting on Boing Boing feels like warm onion-gravy running down your face.
I can see why the functionality is there on twitter. Being able to allow online services to post to your twitter can be a great thing. It allows for services like Hootsuite, where you can post to any social media site from one place. Or any other device or site that posts stuff automatically (that you want). Your GPS watch could tweet when you finish a run, and some people want this.
The problem is when companies hijack this service. I bet it was worded as something like âconnect to my twitterâ, then twitter had a list of granted permissions that people clicked through. They didnât realize that âconnectâ meant âpost whatever the hell this company wants about themselves, pretending to be meâ.
The fix canât really be on twitterâs end. It has to be what happened here. Outraged customers, bad press. Hopefully someone gets fired.
How much you wanna bet a bunch of people were totally ignored when this came up in meetings and they said âPeople will not like that.â The Happy Happy in the room told them not to be a spoilsport.
The good news is that, now most ComicCon attendees have learned not to hand over their Twitter password. The bad news is thatâs what percent of America⌠point-lots of zeros-one? I think this trick is going to work over and over and over before most of us wise up.
What makes you think anyone handed over passwords?
All the signs of a deliberate spam run: âOpt inâ yeah sure, Iâll bet less than one per cent knew they were âopting inâ to anything.
You can tell the lawyers worked this over" âperceivedâ overstep⌠and âprobably too enthusiasticâ and âon behalf of attendeesâŚâ.
Total BS, they knew exactly what they were doing but were just too stupid to think anyoneâd notice and object. Clueless marketing weasel activity.
For Sy[quote=âBoundegar, post:11, topic:11871â]
The good news is that, now most ComicCon attendees have learned not to hand over their Twitter password.
[/quote]
Stealing passwords is brutally retro: Twitter has a fully supported mechanism for the delegation of certain powers, to be carried out as though by the user, without any password sharing. Facebook and friends, most of the âsocialâ world have equivalents of various flavors.
Architecturally, Iâm sympathetic. Secure capabilities delegation is absurdly superior to password sharing, and has legitimate and necessary uses (y hello thar sudo, we were just talking about youâŚ); but realistically it has always made the hairs on the back of my neck rise a bit in the context of âsocial mediaâ services, whose primary purposes (in the hands of 3rd parties, who would be the access delegates) are almost invariably spam, data-mining, and the occasional splashy humiliation/character assassination of the account-holder. The fact that those miserable abhumans at Zynga made very, very, heavy use of these delegation capabilities in promoting Farmville and its vile ilk probably donât help my feelings on the subject.
TL;DR: It almost certainly wasnât a password breach, itâs a capability that âsocialâ companies (especially the starving ones with minimal revenue models, like, oh, Twitter) almost invariably have, largely for the benefit of their real customers, and no, nobody will learn anything.
Never ascribe to cluelessness what would be the natural behavior of evilâŚ
Heh, âperceived overstep.â
Talk about sleaze.
Normally Iâd agree but marketing âexpertsâ live in a very isolated bubble
in which everything is filtered by their own hype and after a while, they
start thinking they understand âwhat people wantâ and start believing that
their opinions are reality.
Look up the history of the Ford Edsel, âThe Car America Wants!â, to see
just how deeply they can get themselves embedded into their own artificial
reality and how badly they understand things.
Being twitless, I had no idea. I have a very happy feeling today about my lack of social media.
So, like some sick little cult, except with a nigh-unlimited budget for ad buys across virtually every medium in the developed world?
Somebody should go back and warn the Sumerians about where this âcivilizationâ nonsense is going to lead.
I try to avoid the stuff myself; but the architectures (whether the actual code, things like OAuth are reasonably common, or just the concepts) crop up in all sorts of places, with social media just being the one where humanityâs moreâŚmalignant facets⌠tend to crawl around them.
Impersonation has loads of banal use cases, often actually beneficial, in computer systems (hypothetically, for instance, you could useâs Twitterâs OAuth mechanism to ensure that your phone, with its high odds of being lost or stolen, can allow you to tweet without retyping your password and without storing it at all, instead just storing an OAuth token that you can revoke should you lose the phone, or it be revealed that the maker of the app you were using is an unethical scumweasel hoovering up contact data for marketing purposesâŚ) You also see it in system security (in Windows, the UAC âelevationâ process which allows you to run at low privileges most of the time; but makes adopting high privileges when needed much easier than logging out and logging in as admin. Similar admin credentials prompt mechanism on OSX, sudo or su on Linux and the traditional unixlikes) and in various groupware scenarios (show me an organization with an Exchange server, and Iâll show you an organization where the secretary probably has read/write access to the bossâ calendar, to manage it and schedule meetings and such).