Twitter recently transitioned to OAuth, but the social network's implementation of the new authentication system has some serious flaws. Ars shows how easy it was to compromise the secret key of Twitter's own official client application for Android.
S. Pujari, A. Hadgu, E. Lex, und R. Jäschke. Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, New York, NY, USA, ACM, (2015)
F. Kooti, N. Hodas, und K. Lerman. Proceedings of the eighth International AAAI Conference on Weblogs and Social Media, Seite 266--274. AAAI, AAAI Press, (Juni 2014)
X. Wen, Y. Lin, C. Trattner, und D. Parra. Proceedings of the 25th ACM Conference on Hypertext and Social Media, Seite 285--290. New York, NY, USA, ACM, (2014)
M. Tsagkias, M. de Rijke, und W. Weerkamp. Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, Seite 565--574. New York, NY, USA, ACM, (2011)
S. Wu, J. Hofman, W. Mason, und D. Watts. Proceedings of the 20th International Conference on World Wide Web, Seite 705--714. New York, NY, USA, ACM, (2011)