I believe Chad's update http://bit.ly/12RvNY just underlines the importance of my request.
An attack on Twitter normally has one thing in mind: disruption of service. If the defenses can be architected to blunt the attack and allow normal operations, including third-party applications, to continue unaffected, it has one result, namely: THEY LOSE!
