To be fair, I don't actually know if this is really ODELL or someone else posting with his keys.
Login to reply
Replies (1)
Would it not be trivial to write a program that loops over a list of (hacked) keys to post notes at scale? Getting the list of keys is harder, but once obtained, is equivalent to owning multiple X/Twitter handles.