TechCrunch quits trickling Twitter docs

Documents show "the dedication and deep commitment of this team to making Twitter into a world-class company."

TechCrunch concluded its days-long drip of stolen Twitter documents with details on the company's conversations with Google and Microsoft.

In the process, TechCrunch is showing a bit of softness toward Twitter, saying that the rawness of the documents show "the dedication and deep commitment of this team to making Twitter into a world-class company."

There's a lot of nitty gritty in these documents, but the big picture shows Twitter spending a lot of energy on, well, everything. The company worries about Google, and how it can either beat the search giant at finding tweets or provide an application programming interface to Google and large corporations. Facebook comes up, with executives worrying about the various ways Twitter could be buried by the bigger social networking site.

Execs also discuss VIP users like Shaq and Diddy, with the possibility of giving them "advisor shares." Twitter isn't turning a blind eye to the groundswell of third-party Twitter apps, either. In meetings, Twitter executives talk about acquiring or supporting Twitpic, Photobucket, and Tweetie.

Of course, business models are discussed from various angles, with possibilities that include AdSense widgets and sponsored tweets. The overarching goal is to reach 1 billion users and monetize a small amount on each of them.

Overall, Twitter comes off well in TechCrunch's grand leak finale. In public, the company has been cagey about its business strategy and how it will play with others who want a piece of its user base, but it seems no stone is being left unturned behind closed doors. The images surfaced courtesy of a hacker who wanted to demonstrate how easily he broke into a Twitter exec's Gmail account and obtained Google docs.

TwitterGate may be over on TechCrunch's end, but it'll continue to resonate now that Twitter's secrets and strategies are out in the open. How Twitter and TechCrunch can get along from here depends on who you ask. Behind the scenes, the two Web sites have been talking about the "right way" to go about releasing the documents, TechCrunch writer Erick Schonfeld said, and the tech Web site will explain that process in the coming days.

The other possibility is a lawsuit. We've discussed how that's certainly not out of the question. For now, let's all take a deep breath and get back to tweeting -- or decrying it as an overhyped, undercooked version of Facebook.

Join the CSO newsletter!

Error: Please check your email address.

Tags social networkingtwitterhacking

More about FacebookGoogleMicrosoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jared Newman

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts