Inherent Flaws in Login Systems of Facebook and Twitter with Mobile Numbers
Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 4
Abstract
There are many social networking websites that provide online networking opportunities; all of these platforms require creating an account, then logging in and updating information to maintain a profile. Our research investigates mobile number based log in feature of both Facebook and Twitters - two exemplary social networking sites – for degree of seamlessness and other security features. Our research reveals that there are major dissimilarities as well as flaws in the deployment of mobile number based login on these two platforms. It has been observed that Twitter allows creation of multiple accounts using one single mobile number, however, logging out from one such account automatically logs out all other accounts associated with the same number. On the contrary, Facebook allows creation of multiple accounts using one single mobile number without deactivation of the previously created ones, however, if same password is used for more than one accounts associated with the same number, only one account can be accessed at any given time. This paper also provides probable solutions to address the security loopholes as identified by our research.
Authors and Affiliations
Jawaid A. Mangnejo, Arif R. Khuhawar, Muneer A. Kartio, Saima S. Soomro
Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation
This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware an...
Inherent Flaws in Login Systems of Facebook and Twitter with Mobile Numbers
There are many social networking websites that provide online networking opportunities; all of these platforms require creating an account, then logging in and updating information to maintain a profile. Our research inv...
Towards a Quantum Field Theory for Optical Artificial Intelligence
Today, several socio-techno-economic drivers are steering the evolution of Telecommunications and Internet towards a growing exploitation of ultra-broadband infrastructures (e.g., 5G) and Artificial Intelligence (AI) sys...
Consideration of Quality Attribute Tradeoffs of the Blockchain Pattern in the Software Development Process
The Blockchain (BC) design pattern has many variations and is a concept that is anticipated to lead many implementations in the years to come. The number of choices for a BC implementation continues to increase since new...
Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks
Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the netw...