Skip to main content

How @ITweetBio Authenticates You


@ITweetBio lists Twitter bios and regularly tweets from the list. You can enlist your Twitter bio there. @ITweetBio wants to make it easy for you to enlist your bio without requiring you to register yourself with the service, or making you to authenticate the application. You are already known in Twitter by your handle. You can just give your Twitter handle like @BlindTalk, and @ITweetBio will use the handle to read your bio from Twitter and enlist it. However, anyone can give your Twitter handle to @ITweetBio acting like he is you. @ITweetBio wants to verify that you are the one who gives the handle, not anyone else.

I wrote a short article almost three years ago on Authentication by Mentioning using Twitter but I didn't give any sample code. I am going to give a sample code at the end of this article. I found it easy to authenticate someone using only his Twitter account. All he has to do is tweet a specific message from me and I will read his Twitter status that must match with the message. Obviously only he can do the tweet from his Twitter account. However, his Twitter time line must be made public so that I can read his status without using any credential. If he makes his time line private then I have to be his follower first, that he has to allow me reading the time line.

@ITweetBio assumes that your Twitter time line is public. You are required to tweet a bio from the list. Once you have tweeted, @ITweetBio will read your last Twitter status looking for the same bio. If they are matched then you are authenticated and your bio will be enlisted.

Imagine that your Twitter bio is already enlisted and at the same time someone else wants his bio also to be enlisted. The person will be asked to tweet probably your bio and he does it. Thus, your bio is also tweeted by someone else other then a potential tweet by @ITweetBio. Asking someone to tweet bio serves two purposesto authenticate and to get bios to be tweeted.


The Code

The following is the PHP code to read someone Twitter status given the handle:

function read_status($handle)
{
  $user = json_decode(
    file_get_contents(

  if (isset($user->status) && isset($user->status->text))
    return $user->status->text;

  return FALSE;
}

Note that you don't want to be querying Twitter only for the user status since the $user object contains many other information. The user bio is also returned with the same query.

Comments

Popular posts from this blog

Setting Up PyScripter for Quantum GIS

PyScripter is a general purpose Python Integrated Development Environment (IDE). Quantum GIS (QGIS) is a desktop GIS application that can be extended with Python plugins. Both are open source softwares. We intend to use PyScripter as an IDE to build QGIS Python plugin. We are using PyScripter 2.4.1.0 and QGIS 1.6.0 in Windows. PyScripter does not come with Python. On the other hand, QGIS is built in with Python. Thus, we will setup up PyScripter to use the build in Python in QGIS. We assume both PyScripter and QGIS are already installed. Preparing PyScripter batch file We assume that QGIS is installed in C:\OSGeo4W\ folder and PyScripter is installed in C:\Program Files\PyScripter\ . 1. Copy qgis.bat in C:\OSGeo4W\ bin to pyscripter.bat 2. Edit pyscripter.bat to remove the last line that read something like this start "Quantum GIS" /B "%OSGEO4W_ROOT%"\apps\qgis\bin\qgis.exe %* and replace it with this in one line Start "PyScripter" /B "C:\Progr...

Access Control

Access control is about controlling user flow within your application. Do not mistaken access control with security which is a bigger subject in itself. Access control begins by authenticating user and limit his or her activity in your application. An activity is something like creating, updating or deleting a content. There are always finite number of activities that can be done in a given application. Each user can be assigned to a set of activities that he or she is allowed to do. Access control is usually tied to session management. However, you do not need session management to have access control. When a user log in, a session is created so that the user is remembered for the subsequent access. Otherwise the user has to keep on providing his or her credential for each access. We can also keep a list of activities that the user is allowed to do in the session record. Some applications let the session alive indefinitely and some applications time out user after a duration of inacti...

Separation of Front-end and Back-end Concerns

Separation of concerns is the cornerstone of MVC framework. Model, view and controller are three broad concerns of web-based software development. On its early days MVC was implemented on server side. The server renders views for clients. Nowadays, most clients render views themselves. Even the terminology of client-server has already morphed into front-end and back-end . The need for back-end to handle views is diminishing. View concerns have became increasingly complex with two big sub-concerns of aesthetic and dynamics. Front-end evolves into bigger MVC concerns of itself. While back-end evolves into larger modeling concerns. Now, front-end and back-end are two separate concerns. Front-end and back-end are handled by two different teams of software developers with different specialties. Back-end evolves into something like "dinner can be served even without plates, forks and spoons, without table and chairs, and without a dinning room." Front-end is serving the withouts....