Zero percent, and report for spam.
Date: Sun, 17 Jan 2010 22:13:33 -0800
Subject: [twitter-dev] @ Message read rate for non-followers
From: abstar...@gmail.com
To: twitter-development-talk@googlegroups.com
Hey Guys,
Do you know what % of people read @ messages if you are not a follower
On Mon, Jan 18, 2010 at 3:00 AM, Ken Dobruskin k...@cimas.ch wrote:
Zero percent, and report for spam.
Date: Sun, 17 Jan 2010 22:13:33 -0800
Subject: [twitter-dev] @ Message read rate for non-followers
From: abstar...@gmail.com
To: twitter-development-talk@googlegroups.com
Hey Guys,
Do
Ryan Sarver said it last last year
http://twitter.com/Scobleizer/status/6493268213
On Jan 17, 4:46 am, Hwee-Boon Yar hweeb...@gmail.com wrote:
On Jan 14, 8:30 am, twittme_mobi nlupa...@googlemail.com wrote:
Hello ,
Regarding Basic Auth Deprecation is June
Any where this is announced?
You are correct. The PIN handshaking is only for Desktop Apps.
Ryan
On Mon, Jan 18, 2010 at 9:12 AM, eco_bach bac...@gmail.com wrote:
Jeff, I might be wrong, as there seems to be some confusion on this,
but I believe the extra PIN handshaking is ONLY required for what
Twitter defines as
On Sun, Jan 17, 2010 at 12:54 PM, Abraham Williams 4bra...@gmail.comwrote:
From the numbers I've seen in this thread more then 95% of accounts are are
followed less then 25k times. It would not seem to make sense for Twitter to
support returning more then 25k ids per call. Especially since
Thanks. Hope it's not official. I don't remember reading anything like
that on the 2 lists.
--
Hwee-Boon
On Jan 18, 7:01 pm, Rich rhyl...@gmail.com wrote:
Ryan Sarver said it last last
yearhttp://twitter.com/Scobleizer/status/6493268213
On Jan 17, 4:46 am, Hwee-Boon Yar hweeb...@gmail.com
yes, it's official. The depreciation of Basic Auth will start in June.
Ryan
On Mon, Jan 18, 2010 at 10:57 AM, Hwee-Boon Yar hweeb...@gmail.com wrote:
Thanks. Hope it's not official. I don't remember reading anything like
that on the 2 lists.
--
Hwee-Boon
On Jan 18, 7:01 pm, Rich
Hi there,
As part of my application I've written a script which monitors the
followers of my twitter account and updates my database accordingly.
The idea being that the number of records in my database table (users)
is identical to the number of followers of my Twitter account.
I've hit a
Dear Team Twitter,
I don't mean to be rude about this, but how can we expect that Twitter
will role out an all new developer support center that's going to be
more responsive when inquiries about a major defect in the API are
left hanging for months on end? There is an open issue that is making
Thanks. Hope it's not official. I don't remember reading anything like
that on the 2 lists.
No, it wasn't posted here at the time. I insert a fairly loud *ahem* to
ensure such things are posted here also in the future.
--
personal:
Hello,
you may have heard of twimpact.com. We are using the search api to get
a filtered list of retweets only. We have just noticed that since
January 15, 2010, about midnight UTC, the volume of results returned
by the search API (JSON format) has gone down by about a factor of
ten.
I would
Hi ---
Is their any benchmark that would allow us to plan well into the
future for server resources?
example:
: we would be using the real time streaming API ---
: 5000 users use our service: all would need to see and interact with
their Home statuses time line--
: 1 to 2% are power users
I think I've seen this mentioned before, but I'll add one vote to
getting it fixed...
When logging in via a web app, the default action is Deny. So on my
iPhone when I put in my username and password and hit Go it denies
access. Quite counterintuitive.
Cheers,
Mike
Sent from my iPhone
Is a mobile app more like a desktop app or a web app? The PIN in the
'desktop' flow handles this in the 'non-desktop' flow:
Once Jane approves the request, Faji marks the Request Token as
User-authorized by Jane. Jane’s browser is redirected back to Beppa, to the
URL previously provided
Ok people. Finally managed to crack it. Thanks to Raffi for sharing
the raw text of the request. While working this API i figured out
there are very less resources available on Internet with regards to
the usage of multipart with OAuth and there is lot of confusion and
misleading data.
I will
Native mobile apps(native Android, native IPhone, etc., meaning they run on
the device itself and NOT in the browser) are considered Desktop apps.
Yes, the mobile UX is one of the biggest issues with Twitter's OAuth
implementation.
Ryan
On Mon, Jan 18, 2010 at 11:35 AM, Jeff Enderwick
On 1/18/2010 1:19 AM, Ryan McCue wrote:
Hey guys,
I'm looking to integrate Twitter posting into an application I'm
developing. The catch to this is that because it's open source, and
programmed in PHP, I'd have to distribute the secret key with it.
What's the best way to go about this? I've
that's precisely what i would do - author your code to read from a
configuration file that contains the keys. don't distribute that
configuration file, but, instead, distribute a README or an example
configuration file that the end user would fill in.
On Mon, Jan 18, 2010 at 9:43 AM, John Meyer
we have a command line tool that acts exactly like curl but does all the
oauth signatures transparently to the end user (the user simply needs to
register the keys with the tool). this way people who rely on the ability
to use curl to interact with the API (such as scripts, etc.) can still do
so.
Perhaps someone from Search can comment?
In the mean time, please see:
http://groups.google.com/group/twitter-api-announce/browse_thread/thread/c8c713bb63fac24c
On Mon, Jan 18, 2010 at 2:37 AM, mikiobraun mikiobr...@googlemail.comwrote:
Hello,
you may have heard of twimpact.com. We are
On Mon, Jan 18, 2010 at 12:48 PM, Raffi Krikorian ra...@twitter.com wrote:
we have a command line tool that acts exactly like curl but does all the
oauth signatures transparently to the end user (the user simply needs to
register the keys with the tool). this way people who rely on the ability
You are reading it correct.
You do not want to give out your Consumer Key or Consumer Secret. If
somebody downloads the source of your application, they are most likely
going to be using it in their own application. Therefore, they need their
own Consumer Key and Consumer Secret.
Ryan
On Mon,
Something like that. Ideally, what I would do is configure the app so
that if the consumerkeys (both secret and non) are not present, the user
is directed to a screen to input those for themselves (with maybe a
helpful link to get them in the first place).
On Jan 18, 2010, at 9:46 AM,
Yet, those 775 accounts have the potential ability to reach up to 775,000+
(+, considering the number of retweets they each get) of Twitter's user
base. When they're dissatisfied, people hear. IMO those are the ones
Twitter should be going out of their way to satisfy. Add to that the fact
OK ... let me make *sure* I understand this. Is this the best
practice?:
1. I write a desktop application. Whether it's closed or open source
is irrelevant. I advertise this application for sale, saying, It runs
on Windows, Macintosh and Linux desktops (KDE, Gnome, XFCE, let's
say), it does all
There is a difference between giving your application to others to install
and use, and others downloading your code for their own applications.
If a user is installing your application to use, then your code would
include your consumer key.
If a user is downloading your open source code to use
Another beta tester here! ;-)
On Jan 18, 9:54 am, TJ Luoma luo...@luomat.net wrote:
On Mon, Jan 18, 2010 at 12:48 PM, Raffi Krikorian ra...@twitter.com wrote:
we have a command line tool that acts exactly like curl but does all the
oauth signatures transparently to the end user (the user
Hiu
Am building an AS3 based twitter client.
Once the user has authorized access at the Twitter OAuth sign in
page,
1 Twitter returns an oauth_token and an authenticity_token
2 Twitter redirects the user back to the application URL, appending
the oauth_token to the application url.
My question
On Jan 18, 3:50 am, techtimes techf...@gmail.com wrote:
Hi ---
Is their any benchmark that would allow us to plan well into the
future for server resources?
example:
: we would be using the real time streaming API ---
: 5000 users use our service: all would need to see and interact
Agreed.
The reason you don't want to give out YOUR consumer key and consumer secret
in your open-source code is because somebody could download your code, make
malicious changes to make it do something bad, and now their app looks
exactly like yours to Twitter since the consumer keys are the
Seriously, are we still beating this dead old horse?
Closed or open source doesn't matter. The fact that a consumer key and
secret (!) are redistributed = design FAILURE.
It's trivial to recover the consumer key and secret from a closed source
application, which can in turn be used in a
Just the consumer key, or both the consumer key and consumer secret?
both are needed when doing OAuth.
Ryan
On Mon, Jan 18, 2010 at 2:52 PM, M. Edward (Ed) Borasky zzn...@gmail.comwrote:
On Jan 18, 11:32 am, John Meyer john.l.me...@gmail.com wrote:
On 1/18/2010 12:22 PM, ryan alford wrote:
I'm part of the TwitterVB library project. Part of my effort is to write
an object that encapsulates a connection to TwitVid.com I'm currently
testing the upload function but am having problems:
Upload = String.Empty
If DateTime.Now m_dtTL Then
Search API team is recommending developers to migrate over to
Streaming API. To get started with this, i was looking at the
Streaming API docs and they state that if using Track for query
parameter, Terms are exact-matched, and also exact-matched ignoring
punctuation. From what i can figure out
On Jan 18, 11:48 am, Dossy Shiobara do...@panoptic.com wrote:
Seriously, are we still beating this dead old horse?
Closed or open source doesn't matter. The fact that a consumer key and
secret (!) are redistributed = design FAILURE.
It's trivial to recover the consumer key and secret from a
Why would you be required to have a server? To keep your consumer key and
consumer secret out of your app? It's not required. Mine are stored in a
database that is coupled with my application. The database is password
protected, so nobody is getting in.
Ryan
On Mon, Jan 18, 2010 at 4:27 PM,
Hint: If the data is in RAM at any point in time, your entry-level
hacker kiddie can recover the keys in cleartext.
Storing your key on a remote server and fetching it doesn't protect it
either. As long as that key is brought to a machine that an attacker
has full control over, it might as well
I don't know if this is the right place to ask about this, but why am I
on several sources (Twitvid, filesocial, etc) receiving a rsp status
when an upload succeeds but an rsp stat when it fails? Or is the
documentation a little bit off?
I've been able to track act.ly urls by using act. So try bit and just
throw out anything that isn't a bit.ly url.
On Mon, Jan 18, 2010 at 1:05 PM, vivekpuri v...@vivekpuri.com wrote:
Search API team is recommending developers to migrate over to
Streaming API. To get started with this, i was
It would be less work for me to run charles proxy and see catch the consumer
key/secret in transit then to decompile it and figure out where in the code
it is actually stored when distributed with the app.
Previously with basicauth you could use anybodies source param and spoof
their application.
Also, the consumer secret is harder to get since its not sent as a
parameter.
Ryan
Sent from my DROID
On Jan 18, 2010 7:18 PM, Abraham Williams 4bra...@gmail.com wrote:
It would be less work for me to run charles proxy and see catch the consumer
key/secret in transit then to decompile it and
This doesn't seem to be working for me. When I check my rate limit,
it appears it's still applied to the IP address and not the account.
I am trying to authenticate with the following script. Anyone have
any tips? Does this look correct?
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL,
I think that the resources will be determined in great deal by how
your your application handles it's data and processes. Remember that
much of the interaction towards twitter Api will use network
(bandwidth) resources and very little machine (CPU, Ram) resources. In
our personal experience much
I was working on an app, which needs to get all the RT for a given
query. However, i found out that it cap's out to 1500
(100tweets*15pages)
Also, all these queries could be within a short span of time (hours to
a few days). So, in some cases if I get RT more than 1500, my current
implementation
Hi,
I've been asked to help implement and test the Profile Widget found
here http://twitter.com/goodies/widget_profile
onto a company website. I've implemented it easily, but I have
concerns about the rate limits. I found that:
A) 1,000 total updates per day, on any and all devices (web, mobile
John Meyer wrote:
Technically, you don't. All opensource requires is that you
distribute the source code, not the individual data. So you could
specify that the secret key is in a particular file and then other
users could insert their own secret key.
Right, so everyone would have to get
I was directed to this user group by Twitter Support in regards with
my query. I am interested in tweeting selective followers of an user
who have declared interest in receiving specific tweets based on some
categorization.
Creating a separate account for each such category or sending DM to
each
I'm having this issue too. How long is the turnaround supposed to be?
On Jan 15, 2:19 am, Gavin Bong rubyco...@gmail.com wrote:
Hi,
I changed my application'scallbackURL but twitter is still calling
the oldcallbackURL.
It was changed 8 hours ago. What gives ? What should I do ?
Regards,
( posted a reply to an old topic, but it appears to have disappeared
into the ether )
My changes to the callback URL don't seem to be taking effect. I've
tried changing it a few times over the last week, and it never seems
to have gone through. Is anyone else having problems with this?
Thanks!
PHP as in web-based? Why wouldn't the user just login to the website?
Ryan
Sent from my DROID
On Jan 18, 2010 10:03 PM, Ryan McCue li...@rotorised.com wrote:
John Meyer wrote: Technically, you don't. All opensource requires is
that you distribute the so...
Right, so everyone would have to
I'm trying to define a minimum viable product that I can *sell*.
Nothing I've seen in this thread so far has convinced me that a
desktop application accessing Twitter is viable, with or without
oAuth. Without oAuth isn't viable because it's deprecated by
Twitter, and with oAuth isn't viable
On Jan 18, 11:48 am, Jeff Enderwick jeff.enderw...@gmail.com wrote:
mobile browser cpu/mem requirement mobile twitter client cpu/mem
requirement.
Yeah ... I don't develop mobile apps, but I suspect you're right. It's
too bad pure HTML has such a lame user experience, because if you
could live
On 1/18/2010 6:43 PM, Ryan McCue wrote:
John Meyer wrote:
Technically, you don't. All opensource requires is that you distribute
the source code, not the individual data. So you could specify that
the secret key is in a particular file and then other users could
insert their own secret key.
On 1/18/2010 8:16 PM, M. Edward (Ed) Borasky wrote:
I'm trying to define a minimum viable product that I can *sell*.
Nothing I've seen in this thread so far has convinced me that a
desktop application accessing Twitter is viable, with or without
oAuth. Without oAuth isn't viable because it's
I suspect that you're sending something like 'text ' + urlencode
(url). Note that sending involves urlencoding. On the other end,
twitter url urldecodes the status as a whole, but try to figure out
what's url encoded in the status.
Don't do that.
Instead, send 'text ' + url. Your send routine
Our client would make even less sense to you then. It's written in Scala!
On Sun, Jan 17, 2010 at 9:56 PM, M. Edward (Ed) Borasky zzn...@gmail.comwrote:
As an aside, could Twitter release the streaming client they use under
some open source license, so we can use it as a prototype? I took a
* Isaiah Carew isa...@me.com [100118 19:02]:
If every person that uses an app accesses the API with their own personal app
credentials that would mean the app would appear to Twitter as hundreds, or
potentially thousands, of individual applications.
One goal of application registration is
You can request access my emailing api at twitter dot com.
2010/1/17 hide pinarello.mar...@gmail.com
Hi,
I also want Gardenhose access level.
Please let me know email address to get EULA.
On 2009年12月28日, 午後12:00, John Kalucki j...@twitter.com wrote:
All Twitter accounts have access to
The consumer secret is not public. The consumer key can be seen in the
query parameters, but the consumer secret is not a query parameter. It
would have to be reverse engineered using the signature.
If twitter determines that a specific application is malware, I would only
hope that they would
1) The sample resource returns a sampled stream, best for statistical
analysis and the like. The filtered resource returns a stream filtered by
the supplied predicates. You will mostly be using the filtered resource.
2) Retweets can be found with the follow parameter. See
Writing directly into the database ensures data loss during any sort of
database maintenance, performance degradation, or outage. Writing first to a
log file (or other asynchronous queueing mechanism) allows for
considerable operational flexibility. The wiki sketches the recommended
architecture.
On Mon, Jan 18, 2010 at 19:57, Marc Mims marc.m...@gmail.com wrote:
That isn't reasonable. If my desktop app has 10,000 users, and one user
extracts and uses the consumer key pair, regenerating a new pair and
distributing them is a huge burden on the developer and the 9,999 other
users. And
On 1/18/2010 8:57 PM, Marc Mims wrote:
* John Meyerjohn.l.me...@gmail.com [100118 19:38]:
But you still control your own keys. If you find that somebody has
compromised your program, you can revoke those consumer keys through
twitter and regenerate them.
That isn't reasonable. If my
* ryan alford ryanalford...@gmail.com [100118 20:01]:
The consumer secret is not public. The consumer key can be seen in the
query parameters, but the consumer secret is not a query parameter. It
would have to be reverse engineered using the signature.
If twitter determines that a specific
* Abraham Williams 4bra...@gmail.com [100118 20:10]:
If rolling out a new update is a burdon on you and your user you are doing
it wrong. http://code.google.com/p/omaha/
Rolling out a new version because someone compromised the consumer key
pair is a burden. Are you prepared to roll out a new
* John Meyer john.l.me...@gmail.com [100118 20:12]:
Which would probably have its own feasibility problems. If I'm a
malware producer, for instance, I'm not just going to compromise one
user account with one consumer keypair. I'm going to compromise ten
thousand users.
That's the beauty of
Who said that was even an option? I haven't seen one person who said that
requiring every user to create their own consumer keys to use with an
application was an option. The only reason that is even in this discussion
is because somebody misinterpreted an answer and that's what they thought
was
* ryan alford ryanalford...@gmail.com [100118 21:03]:
Who said that was even an option? I haven't seen one person who said that
requiring every user to create their own consumer keys to use with an
application was an option. The only reason that is even in this discussion
is because somebody
ryan alford wrote:
PHP as in web-based? Why wouldn't the user just login to the website?
Ryan
Yes, it's open source software that users run on their own servers. It
is *not* a hosted service (if it was, it'd be fine).
--
Ryan McCue
http://ryanmccue.info/
John Meyer wrote:
No, the point I was trying to make was that you don't HAVE to
distribute the key. Nothing in the open source license requires you
to give that information to another person. You can distribute it if
you want to, but you are perfectly free to give them the source code
and
Further to this, I think Abir has raised a subject that gets little attention
on this list, user behaviour. It is relevant as we must take it into account as
we design our apps.
My initial response to the OP was of course facetious. If a message arrives in
my timeline I will read it, which is
71 matches
Mail list logo