Birdwatch Note
2024-10-05 22:04:11 UTC - MISINFORMED_OR_POTENTIALLY_MISLEADING
MITM attacks are not relevant to the majority of users today, as browsers use encryption for the majority of websites, and both iOS and Android require apps to use encryption. https://developer.apple.com/documentation/security/preventing-insecure-network-connections https://android-developers.googleblog.com/2019/12/an-update-on-android-tls-adoption.html Other attacks, such as vulnerable software are not usually stopped by VPNs and require a firewall.
Written by EFA3798C80624A7234A59B12A6EB5898353CE37E6EE92BA128749DCA97F5062E
Participant Details
Original Tweet
Tweet embedding is no longer reliably available, due to the platform's instability (in terms of both technology and policy). If the Tweet still exists, you can view it here: https://twitter.com/foo_bar/status/1842573420317315280
Please note, though, that you may need to have your own Twitter account to access that page. I am currently exploring options for archiving Tweet data in a post-API context.
All Information
- ID - 1842687253010698537
- noteId - 1842687253010698537
- participantId -
- noteAuthorParticipantId - EFA3798C80624A7234A59B12A6EB5898353CE37E6EE92BA128749DCA97F5062E Participant Details
- createdAtMillis - 1728165851248
- tweetId - 1842573420317315280
- classification - MISINFORMED_OR_POTENTIALLY_MISLEADING
- believable -
- harmful -
- validationDifficulty -
- misleadingOther - 0
- misleadingFactualError - 1
- misleadingManipulatedMedia - 0
- misleadingOutdatedInformation - 1
- misleadingMissingImportantContext - 1
- misleadingUnverifiedClaimAsFact - 0
- misleadingSatire - 0
- notMisleadingOther - 0
- notMisleadingFactuallyCorrect - 0
- notMisleadingOutdatedButNotWhenWritten - 0
- notMisleadingClearlySatire - 0
- notMisleadingPersonalOpinion - 0
- trustworthySources - 1
- summary
- MITM attacks are not relevant to the majority of users today, as browsers use encryption for the majority of websites, and both iOS and Android require apps to use encryption. https://developer.apple.com/documentation/security/preventing-insecure-network-connections https://android-developers.googleblog.com/2019/12/an-update-on-android-tls-adoption.html Other attacks, such as vulnerable software are not usually stopped by VPNs and require a firewall.
Note Ratings
rated at | rated by | |
2024-10-06 08:23:22 -0500 | Rating Details | |
2024-10-06 07:21:11 -0500 | Rating Details | |
2024-10-06 02:36:20 -0500 | Rating Details | |
2024-10-06 07:37:29 -0500 | Rating Details | |
2024-10-06 06:42:19 -0500 | Rating Details | |
2024-10-05 19:48:21 -0500 | Rating Details | |
2024-10-06 01:24:18 -0500 | Rating Details | |
2024-10-05 17:29:01 -0500 | Rating Details |