Twitter Employs Top Hacker as Security Head

Twitter is employing one of the world’s best-known hackers to handle everything from engineering slip-ups to misrepresentation.

It announced that Peiter Zatko who is popularly renowned as Mudge is going to be the head of security and it had given him a broad mandate to commend changes in structure and practices. He is desired to take over management of important security functions after a review of 45- to 60-day.

He has said that he will investigate information security, site honesty, physical security, platform integrity, which begins to touch on abuse and manipulation of the platform, and engineering. He was most recently overseeing security at Stripe. Before that, he worked with Google on special projects and oversaw handing out several project grants on cyber-security at Defence Advanced Research and Projects Agency. His career started in the 1990s when he concurrently conducted recognized work for a government contractor and was among the leaders of Cult of the Dead Cow which is a hacking group infamous for rolling out Windows hacking tools to stick Microsoft into enhancing its security.


Image from Twitter


Twitter faces several security challenges. One example of that would be of a year ago when the United States government accused 2 men of spying for Saudi Arabia when they were employed at Twitter years before, saying that they passed along private info about the kingdom’s critics.

The previous chief security officer of Facebook said that the data breach during this summer was a significant reminder of how far Twitter needs to go in creating some of the fundamental security functions which are vital to run a service aimed by challengers much more accomplished than the teenagers who were arrested for that incident.

Zatko is committed to augmenting public chats on Twitter. He praised a current move to upsurge “friction” by encouraging users to comment rather than a retweet.

The new head of security has said that he appreciated Twitter’s frankness to unusual security approaches which for instance was his proposal for confusing bad actors by manipulating the data they got from Twitter about how people communicate with their posts.

%d bloggers like this: