These tweets are showing up as being posted from the Twitter web interface.
And approved partners can use the corresponding API to post this way.
I say it can't be relied upon when an active & involved hack is underway.
You provide nothing of value. What do you think this entire thread is, but for idle speculation?