Twitter revealed on Thursday that users of its Android application may have had their supposedly protected tweets made public due to a bug.
When a new Twitter account is created, the tweets posted by the user are public by default. However, users can ensure that only approved followers can see their posts by using the “Protect my Tweets” option from the account’s “Privacy and safety” settings.
However, due to a flaw, people who used Twitter for Android may have had the protected tweets setting disabled if they made certain changes to account settings, such as modifying the associated email address.
According to the social media giant, the bug existed between November 3, 2014, and January 14, 2019, when a patch was released.
Twitter says it has notified impacted users and re-enabled the protected tweets option if it was disabled. The company claims the flaw did not impact the iOS app or the web version.
“We are providing this broader notice through the Twitter Help Center since we can’t confirm every account that may have been impacted. We encourage you to review your privacy settings to ensure that your ‘Protect your Tweets’ setting reflects your preferences,” Twitter said.
This is not the first time in recent months that Twitter has disclosed information exposure bugs. In May of last year, Twitter warned users that a bug caused plaintext passwords to be stored in its internal logs.
In September, the company reported that a flaw exposed the direct messages of millions of users to third-party developers for well over a year. In December, a researcher revealed the existence of a vulnerability that resulted in Twitter apps getting more permissions than they claimed.
In mid-December, Twitter told users that it may have been targeted in a state-sponsored attack. The incident was discovered during the analysis of an information disclosure flaw affecting one of its support forums.
Related: New Twitter Rules Target Fake Accounts, Hackers
Related: New Open Source Tools Help Find Large Twitter Botnets

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks
- Recently Patched TeamCity Vulnerability Exploited to Hack Servers
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
- Johnson Controls Hit by Ransomware
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Government Shutdown Could Bench 80% of CISA Staff
- Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
Latest News
- Johnson Controls Ransomware Attack Could Impact DHS
- Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks
- CISA Kicks Off Cybersecurity Awareness Month With New Program
- Recently Patched TeamCity Vulnerability Exploited to Hack Servers
- Silverfort Open Sources Lateral Movement Detection Tool
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
