• Optional@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    5 days ago

    Twitter followers don’t imply monetary interaction. Venmo does.

    Right? Maybe I’m missing it.

    • testfactor@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      4 days ago

      Nah, Venmo contacts are often based off of your phone contacts. So that’s probably just a list of people he has saved to his phone (who also have Venmo).

      And even if you did have to pay someone for them to show up, it still doesn’t seem like much of a scandal. It’s not like someone in the contact list was “drug dealer” or something. Who cares if he venmo’d a coworker $20 for lunch?

      Idk man. Like, leaking your phone’s contact list probably isn’t the best thing ever, but it’s hardly a huge deal imo.

      • Optional@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        4 days ago

        Like, leaking your phone’s contact list probably isn’t the best thing ever, but it’s hardly a huge deal imo.

        For the national defense secretary? (Edit: sorry, “national security advisor”) It really kinda is, though.

        • testfactor@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          4 days ago

          Idk man, he’s a public figure. Like, would we be this mad if Kamala accidentally leaked her phone’s contact list (names only, no numbers)?

          And to be clear, it’d be another thing entirely if he had, like, secret government sources in his contact list or something. But I don’t see anyone saying that as far as I can tell. It’s just his personal friends and contacts.

          • Optional@lemmy.world
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            4 days ago

            I mean - yes?

            This is the kind of opsec you should have if you’re an executive at a mid-level company. Much less Vice President or anywhere related to the decision making body of the military.

            Shit, I’d harrangue my friends and famliy for this by default. There are lots of attack vectors you open by having a list of “close friends” or whatever you want to call it. We just saw a self-own with the Signal stuff. But a malicious actor could social-engineer one of these pinheads in no time to set up some kind of phishing or other attack.