The cybersecurity takeaway from Twitter’s verification chaos

On Twitter, a notable person verifies who they are, and now they’re verified for all time (or until a billionaire buys the service and changes the verification policy). Whether verified or not, Twitter users must authenticate themselves with passwords and phone numbers.

Verification usually happens one time in any given system. Authentication is a repeated act to demonstrate that the person accessing something is, in fact, the person previously verified. Verification is: “Here’s proof that Mike Elgan is a specific person.” Authentication is: “The person attempting to gain access to a system is, in fact, specifically the previously verified Mike Elgan.” 

Like Twitter, organizations of all types need both verification and authentication.

I'm on TWiG!

Don’t miss This Week in Google, with hosts Leo Laporte, Jeff Jarvis, Ant Pruitt and guest: Me! Watch here now.

We talk about the FTX celebrity fallout, Elon Musks Twitter blunders, the end of Protocol, the Swifty Ticketmaster crunch, all manner of Mastodon matters, Amazon layoffs, narcissistic billionaire troubles, the fate of Evernote, birdsong, NASA’s moon launch, Google Wallet on Fitbit, Android Auto and more!

Subscribe to TWiG.

Get the show notes, download, associated links and more.

Get episodes ad-free by joining Club TWiT!