Location Data of Some Twitter Users Leaked

Location Data of Some Twitter Users Leaked

A bug in the iOS Twitter app impacted the privacy of its users.

Users of the Twitter iOS app may have had their location data made vulnerable due to a bug in the platform. 

"We have discovered that we were inadvertently collecting and sharing iOS location data with one of our trusted partners in certain circumstances," Twitter said.

The company says that the bug only appears in the iOS app and only with users who have added a second Twitter account to the platform on their smartphone. If they allowed Twitter to access precise location data on one account, then that setting was automatically applied to both accounts managed via the iOS app. 

This means that accounts that did not give consent to share location data, it was automatically turned on and shared with "a trusted partner during an advertising process known as real-time bidding."

Twitter says their company was the only one to receive the location data and that the advertiser was not privy to that information, which was provided "fuzzed" geo-location data that was scrambled to reduce accuracy.

"We have confirmed with out partner that the location data has not been retained and that it only existed in their systems for a short time, and then was deleted as part of their normal process," the company said on its help site.

This is the fourth Twitter bug disclosed on the Twitter platform in the past year. In September 2018, Twitter said an API bug inadvertently shared some users' private messages with developers of apps they did not authorize to receive the data. Other bugs included a nation-state hacking group accessing data and private tweets made public to all users in January 2019.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3