Deleted No
Hibernated Yes
Last Checked Dec. 3, 2020

Created

Sun Apr 05 00:00:00 +0000 2020

Likes

116

Retweets

82

Source

TweetDeck

View Raw Data

JSON Data

View on Twitter

Likely Available
Profile Image

EFF @EFF

Malicious attackers can take over your device—whether it's a laptop, desktop, smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. Here are some of the ways computers get taken over, and how you can protect yourself. https://t.co/vtegS42qVK — PolitiTweet.org

Posted April 5, 2020 Hibernated