Three obvious attack vectors:
• Claim someone’s Twitter-equivalent username on mastodon.social (happened to me, but seemingly not maliciously)
• Similar username (standard technique on Twitter)
• Identical username, different node (the “fun one”)
Inventor of the “Aanand Style” of eating pizza