I believe Chad's update http://bit.ly/12RvNY just underlines the
importance of my request.

An attack on Twitter normally has one thing in mind: disruption of
service.

If the defenses can be architected to blunt the attack and allow
normal operations, including third-party applications, to continue
unaffected, it has one result, namely:

THEY LOSE!

Reply via email to