logoalt Hacker News

fc417fc802today at 12:11 AM1 replyview on HN

> Are you using unique phrasings or behavioral patterns?

Why would Twitter voluntarily run that sort of query to satisfy a subpoena?

Whether it's difficult and risky for the average user depends on the threat model. "Twitter doesn't directly have my name, address, or phone number sitting in their database next to my account" is easy. Other things are more difficult.


Replies

madarstoday at 12:53 AM

Phrasing idiosyncrasies are publicly observable and anyone can note - as external observers did in Kaczynski or Hanssen cases - that a particular phrasing is quaint. It is probably true that Twitter is unlikely to run a browser fingerprinting query to de-anonymize someone tweeting spoilers from a softcore porn show. But a potential leaker has to ask: "how sure am I of that?"