Twitter’s newest update, an unsung answer to account monitoring, now puts the user on notice in relation to the status of their account activity. This security feature brings a new facet of transparency and accountability to the Twitter userbase.
The new feature, located within account settings under the tab aptly named “Apps and devices,” allows users to see a log of the devices that have accessed your Twitter account. These devices are listed chronologically by the date and time of day that they accessed the account. This feature allows users to log out of the listed devices remotely from any currently logged in one.
Additionally, users can view what third-party apps have access to their Twitter account data. It shows permissions granted to said applications, features of the account, and when permission was granted down to the time of day. The end user now has the power to choose to revoke access from third-party applications at any time with one click. If the revocation was a mistake, the app can be reinstated with another simple click.
Managing unauthorized data access and third-party data leaching on Twitter is now a more transparent process. This new feature comes at a time of ramped up account infiltration and data misusage. It puts the accountability on the end user, bringing the human touch to a predominately algorithmic system of managing account access.
The turbulent state of account security has resulted in a renaissance for data protection solutions. Twitter has chosen a transparent approach, showing that there is nothing nefarious hidden from the account holder. By cutting out the middleman of emailing Twitter’s help desk directly, the user can now monitor their account activity without insecurity.
In the digital backend, hacked accounts don’t typically show tell-tale signs of being compromised for days or even months after being infiltrated. Twitter has made the executive decision of making the end user an integral part of account security, which will likely make attacks on specific accounts far easier to notice and deal with. If other social media platforms are perceptive of current security trends, they’ll likely follow Twitter’s example of transparency and accessibility.