Comments on: Like FireSheep? You Will Love FireTweet! http://www.welivesecurity.com/2011/06/10/like-firesheep-you-will-love-firetweet/ News, Views, and Insight from the ESET Security Community Mon, 03 Feb 2014 08:49:00 +0000 hourly 1 http://wordpress.org/?v=3.7 By: David Harley http://www.welivesecurity.com/2011/06/10/like-firesheep-you-will-love-firetweet/#comment-3090 Sat, 11 Jun 2011 09:48:28 +0000 http://blog.eset.com/?p=7555#comment-3090 While I’m delighted not to be the only security curmudgeon that reads these things, it seems clear to me from Randy’s first sentence that he’s being flippant about comparing the two. And since he has written about Firesheep in some depth in the past, I’m pretty sure he knows the difference.

I’m sure marketing would be very pleased if this post did grab some headlines, but I don’t think it’s going to make the front page of the Wall Street Journal.

]]>
By: Nicko http://www.welivesecurity.com/2011/06/10/like-firesheep-you-will-love-firetweet/#comment-3089 Sat, 11 Jun 2011 09:12:55 +0000 http://blog.eset.com/?p=7555#comment-3089 What Jericho said.

You clearly have no understanding of the two or it’s just shameless headline grabbing.

]]>
By: Jericho http://www.welivesecurity.com/2011/06/10/like-firesheep-you-will-love-firetweet/#comment-3088 Sat, 11 Jun 2011 08:08:41 +0000 http://blog.eset.com/?p=7555#comment-3088 Comparing this bug to FireSheep is absurd. Either you don’t know what FireSheep is and the attack vector it uses, or you are intentionally going for media hype over a considerably more minor issue.

FireSheep does not require a user to click anything or authorize some information to be accessed. Your ‘FireTweet’ crap requires the user to explicitly allow an application to access some of their information, and it happens to look at a bit more than you allowed.

Apples and Weasels.

]]>