Friday, July 30

Twitter mistakenly verified several fake accounts | Digital Trends Spanish

Twitter has made several mistakes in its latest batch of verifications.

The platform microblogging has confirmed to Daily dot that it has permanently suspended a small number of fake accounts that it mistakenly verified within weeks of relaunching its public verification program. The error came to light after Twitter user Conspirador Norteño discovered six verified accounts that had been created on June 16. None of these accounts had posted a single tweet and all of them used stock photos for profile photos and even photos that belong to other users.

Meet @aykacmis, @degismece, @anlamislar, @aykacti, @kayitlii, and @donmedim, a sextet of blue-check verified Twitter accounts created on June 16th, 2021. None has yet tweeted and all have roughly 1000 followers (and mostly the * same * followers).

DC: @ZellaQuixote

& mdash; Northern conspirator (@ conspirator0) July 12, 2021

According to Investigador Norteño, the six accounts had 976 suspicious followers in common and that all of them were part of a botnet made up of at least 1,212 accounts. Twitter attributed the error to a breach in verification procedures and claims it is trying to fix it, although it did not elaborate on how the error occurred.

“We mistakenly approve the verification applications for a small number of fake accounts,” Twitter said to Daily dot it’s a statement. “We have now permanently suspended these accounts and removed their verified badge, thus complying with our tampering and spam policy within the platform,” he added.

Twitter launched a new account verification request process in May. Since then the company has been inundated with requests and several users have complained that their accounts are not verified even though they consider they meet the requirements. The company has announced that it will provide more details to users on why their account was not verified via email.

Editor’s Recommendations

var stage = decodeURIComponent(0); var options = JSON.parse(decodeURIComponent('')); var allOptions = {};

if (stage > 0 && window.DTOptions) { allOptions = window.DTOptions.getAll();

Object.keys(options).forEach(function(groupK) { if (options[groupK] && typeof options[groupK] === 'object') { Object.keys(options[groupK]).forEach(function(k) { if (!allOptions[groupK] || typeof allOptions[groupK] !== 'object') { allOptions[groupK] = {}; }

allOptions[groupK][k] = options[groupK][k]; }); } }); } else { allOptions = options; }

var getAll = function () { return allOptions; };

var get = function (key, group, def) { key = key || ''; group = group || decodeURIComponent('qnqb92BhrzmkpqGx'); def = (typeof def !== 'undefined') ? def : null;

if (typeof allOptions[group] !== 'undefined') { if (key && typeof allOptions[group][key] !== 'undefined') { return allOptions[group][key]; } }

return def; };

var set = function (key, group, data) { key = key || ''; group = group || decodeURIComponent('qnqb92BhrzmkpqGx'); data = data || null;

if (key) { if (typeof allOptions[group] === 'undefined') { allOptions[group] = {}; }

allOptions[group][key] = data; } };

var del = function (key, group) { key = key || ''; group = group || decodeURIComponent('qnqb92BhrzmkpqGx');

if (typeof allOptions[group] !== 'undefined') { if (key && typeof allOptions[group][key] !== 'undefined') { allOptions[group][key] = null; } } };

window.DTOptions = { get: get, getAll: getAll, set: set, del: del, }; }());

Leave a Reply

Your email address will not be published. Required fields are marked *