The document proposes a security architecture called Twimight that allows for Twitter-like functionality during disasters when centralized connectivity is disrupted. Twimight uses opportunistic communication between devices using Bluetooth to spread tweets. It introduces the Twimight Disaster Server which acts as a certificate authority to sign keys and tweets to authenticate users and ensure integrity and confidentiality even when devices are disconnected. The server also helps manage revocation of keys if devices are lost or stolen.