Replies (1)

Would it not be trivial to write a program that loops over a list of (hacked) keys to post notes at scale? Getting the list of keys is harder, but once obtained, is equivalent to owning multiple X/Twitter handles.