Wyden Renews Call to Encrypt Twitter DMs, Secure Americans' Data From Unfriendly Foreign GovernmentsWyden Renews Call to Encrypt Twitter DMs, Secure Americans' Data From Unfriendly Foreign Governments
Following whistleblower complaint, Oregon senator renews commitment to passing bipartisan legislation to address the national security risks.
August 25, 2022
Washington, D.C., Aug. 24 — Sen. Ron Wyden, D-Ore., issued the following statement following a complaint this week by a former Twitter employee that alleged widespread poor privacy and security practices at the social media company:
"The best time to encrypt users' DMs was 5 years ago. The second-best time is today, after reports that thousands of Twitter employees may have access to those conversations.
"I personally urged Jack Dorsey to secure users' private conversations with strong, end-to-end encryption years ago, to ensure Americans couldn't be targeted by criminals, predators and spies. And I renewed that call over, and over again. Unfortunately, I and other advocates were right to be concerned. For the same reason, Apple should end-to-end encrypt iCloud data and secure it against unwanted access. I am also deeply troubled by accusations that foreign companies and governments may have had access to Americans' private data. I've introduced bipartisan legislation to address the national security risks of foreign companies getting our data, and remain deeply committed to passing it in light of these new accusations."
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Everything You Need to Know About DNS Attacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment