Twitter has a new bug that exposes private tweets of some Android users. This is for over five years since they made changes in their settings that includes changing the email address linked to their account.
According to Twitter, the bug which is now fixed disabled the "Protect your Tweets" setting, when certain account changes were made on Android devices and didn't affect Twitter on iOS and desktop.
"You may have been impacted by this issue if you had protected Tweets turned on in your settings, used Twitter for Android, and made certain changes to account settings such as changing the email address associated with your account between November 3, 2014, and January 14, 2019."
"People on iOS or the web were not impacted. We fixed the issue on January 14, and we'll provide updates if other important information becomes available," Twitter said on its Help page.
Twitter went on to inform those who were affected with the bug and has turned "Protect your Tweets" back on for them, just if it was disabled.
"We encourage you to review your privacy settings to ensure that your aProtect your Tweets' setting reflects your preferences," said Twitter, adding it is sorry that this happened.
Last year in May, Twitter had asked its 336 million users to change their password after a bug was discovered that stored passwords in plain text in an internal system.
Twitter said it found no sign that hackers accessed the exposed data but advised users that they should enter a new password on all services where their current password has been used.
In another incident, a bug in Twitter's platform for third-party app developers exposed some Direct Messages (DMs) of nearly 3 million users to outsiders, for which Twitter went on admitted to the fact in September.
The bug ran from May 2017 and after discovering it, Twitter said it fixed the bug to prevent data from being unintentionally sent to the incorrect developer.
Twitter is also facing an investigation by privacy regulators in Ireland over data collection in its link-shortening system.
(With IANS inputs)