Saturday, July 27, 2024
HomeTechnologyTwitter’s Source Code got Leaked Publicly

Twitter’s Source Code got Leaked Publicly

A legal document revealed that Twitter Corporation is looking for information on the individual who released certain sections of the social media platform’s source code. In addition, The New York Times reports, raising new difficulties for Elon Musk’s revival of Twitter 2.0. This might make the platform more susceptible to hackers and rivals. Since an unknown user labelled as “Free Speech Enthusiast” publicly exposed portions of Twitter’s code base without approval.

Twitter is said to have sent a subpoena to the software collaboration site GitHub. The Subpoena’s purpose, according to Twitter’s legal counsel, is to locate the person who released the source code.

Twitter is a social networking website that lets users send and read 140-character messages, or “tweets,” that can have a maximum length of 280 characters. In addition to liking, retweeting, and replying to tweets, users can follow other users to view their tweets in a separate timeline. Furthermore, People and organisations use Twitter to exchange information, interact with their audience, and advance their brands or causes.

The source code for tweet recommendations will be made public on March 31 according to Musk, who paid $44 billion to acquire Twitter last October. However, the platform’s mechanism, according to Musk, who also leads Tesla and several other businesses, is overcomplicated, and he expected that once the source was given access, users will discover many foolish things. It is unknown whether the stolen source is related to the code that creates tweets.

Twitter has requested the US District Court for Northern California to force GitHub to reveal the name of the person who released the code as well as those who downloaded it. However, according to documents disclosed in a government report, the Federal Trade Commission (FTC) is investigating Musk’s major layoffs at Twitter and attempting to access his internal conversations as part of ongoing supervision of the social media company’s privacy and cybersecurity procedures.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments