280 Characters Are Too Many on Twitter? User Breaks Twitter with a 35,000-Character Tweet!

Author Photo
Nov 6, 2017
13Shares
Submit

Haven’t been able to deal with Twitter’s new 280-character limit? Not sure how to get out of the 140-character mind when using Twitter? Well, we all may need to learn a thing or two from two German Twitter users who want the company to extend this limit to 35,000!

Over the weekend, two pranksters broke the platform’s character limit and sent a 35k character tweet. Twitter user Timrasett working with another user HackneyYT broke the limit and sent a tweet that starts with “People! @Timrasett and @HackneyYT can exceed the character limit! You do not believe us? Here’s about 35k characters proof.” This text was followed by thousands of gibberish characters.

twitter-surveillanceRelatedMoscow Claims Twitter Has Agreed to Store Data on Local Servers Despite Surveillance Concerns

The tweet may look like nothing but nonsense, however, some noted that at least some part of this trick depends on formatting the tweet like a URL (.cc/). The exploit was discovered and used by the two, whose accounts were then temporarily suspended by the social media firm. The tweet, of course, has also been deleted but you can see it in all its glory thanks to Internet Archive.

trump-twitterRelatedRogue Employee Deactivates President Trump’s Twitter Account on Last Day of Work

Twitter has confirmed suspending the two accounts temporarily citing “The Twitter Rules”. Both the accounts are back now as the ban has been lifted. But for the future, you may want to refer to these company rules before breaking them (also consider submitting these flaws for some bounties):

Spam and Security

We strive to protect people on Twitter from technical abuse and spam.

To promote a stable and secure environment on Twitter, you may not do, or attempt to do, any of the following while accessing or using Twitter:

  • Access, tamper with, or use non-public areas of Twitter, Twitter’s computer systems, or the technical delivery systems of Twitter’s providers (except as expressly permitted by the Twitter Bug Bounty program).
  • Probe, scan, or test the vulnerability of any system or network, or breach or circumvent any security or authentication measures (except as expressly permitted by the Twitter Bug Bounty program).
  • Access or search, or attempt to access or search, Twitter by any means (automated or otherwise) other than through our currently available, published interfaces that are provided by Twitter (and only pursuant to the applicable terms and conditions), unless you have been specifically allowed to do so in a separate agreement with Twitter. Note that crawling Twitter is permissible if done in accordance with the provisions of the robots.txt file; however, scraping Twitter without our prior consent is expressly prohibited.
  • Forge any TCP/IP packet header or any part of the header information in any email or posting, or in any way use Twitter to send altered, deceptive, or false source-identifying information.
  • Interfere with or disrupt the access of any user, host or network, including, without limitation, sending a virus, overloading, flooding, spamming, mail-bombing Twitter’s services, or by scripting the creation of content in such a manner as to interfere with or create an undue burden on Twitter.
Submit