That might be useful, for example, for an authoritarian regime trying to keep tabs on a journalist's movements.
"More realistically, someone could use that as an entry point into another service," Soltani said, noting that since few people bother using different passwords for different services, a password stolen from Twitter might be just as handy for reading a journalist's emails.