{"id":15581,"date":"2019-06-14T12:10:02","date_gmt":"2019-06-14T20:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/06\/14\/news-9330\/"},"modified":"2019-06-14T12:10:02","modified_gmt":"2019-06-14T20:10:02","slug":"news-9330","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/06\/14\/news-9330\/","title":{"rendered":"Trolls abuse Twitter Lists to collate their targets"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Fri, 14 Jun 2019 19:09:39 +0000<\/strong><\/p>\n<p>I\u2019ve been using Twitter for more than a decade. And one of its features that I find valuable is <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/help.twitter.com\/en\/using-twitter\/twitter-lists\" target=\"_blank\">Lists<\/a>. Turns out I&#8217;m not the only one.<\/p>\n<p>Lists allow Twitter users to group profiles or feeds based on certain criteria, such as sports, tech news, celebrities, fashion\u2014you get the idea. Having Lists makes it a lot easier to find content or catch up on posts I\u2019d otherwise miss without having to scroll down through the seemingly bottomless frames of tweets. Those who follow thousands and don\u2019t want to miss out can relate.<\/p>\n<p>However, a <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.cnbc.com\/2019\/06\/07\/how-trolls-use-twitter-lists-to-target-and-harass-other-users.html\" target=\"_blank\">recent report from CNBC<\/a> details how the Lists feature is used by those with ill intent to collate a group of accounts\u2014aka targets\u2014they can follow, troll, harass, and bully. <\/p>\n<p>This is nothing new. Twitter has been aware of such misuse for several years now, yet according to many users who found themselves or know someone else at the receiving end of abuse, the company has done little to help address this problem.<\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p style=\"text-align:center\">Read: <a href=\"https:\/\/blog.malwarebytes.com\/101\/fyi\/2017\/06\/tackling-the-myths-surrounding-cyberbullying\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Tackling the myths surrounding cyberbullying<\/a><\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p>Twitter stopped notifying users when they were added to a list two years ago. In a Twitter Safety tweet, the company revealed why they did this:<\/p>\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">We want you to get notifications that matter. Starting today, you won&#39;t get notified when you are added to a list. <a href=\"https:\/\/t.co\/82xiaZbg1W\">https:\/\/t.co\/82xiaZbg1W<\/a><\/p>\n<p>&mdash; Twitter Safety (@TwitterSafety) <a href=\"https:\/\/twitter.com\/TwitterSafety\/status\/831247282544599040?ref_src=twsrc%5Etfw\">February 13, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>This was understood as \u201cGetting notified about what lists you\u2019re added to isn&#8217;t as important as who followed you or retweeted and replied to your tweet.\u201d This may seem like a benevolent company move, but for those who deal with targeted social attacks daily, this was terrible news, as they no longer had the means to know who was targeting them. The community had been vocal about this, too:<\/p>\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">.<a href=\"https:\/\/twitter.com\/TwitterSafety?ref_src=twsrc%5Etfw\">@TwitterSafety<\/a> @Support Critical for people to know if they&#39;ve been added to a list intended for targets. This is blinding the vulnerable.<\/p>\n<p>&mdash; SwiftOnSecurity (@SwiftOnSecurity) <a href=\"https:\/\/twitter.com\/SwiftOnSecurity\/status\/831258352038584321?ref_src=twsrc%5Etfw\">February 13, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Ideally, I want to be able to turn off the ability to add me to lists.<\/p>\n<p>&mdash; Louisa <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11.2.0\/72x72\/1f308.png\" alt=\"\ud83c\udf08\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11.2.0\/72x72\/1f46d.png\" alt=\"\ud83d\udc6d\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> (@LouisatheLast) <a href=\"https:\/\/twitter.com\/LouisatheLast\/status\/831260562508091395?ref_src=twsrc%5Etfw\">February 13, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">This is a horrible change no one asked for. Many spammers abuse lists. Being notified let&#39;s us take action to block them.<\/p>\n<p>&mdash; Eric Berry <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11.2.0\/72x72\/1f596-1f3fb.png\" alt=\"\ud83d\udd96\ud83c\udffb\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11.2.0\/72x72\/26a1.png\" alt=\"\u26a1\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11.2.0\/72x72\/1f399.png\" alt=\"\ud83c\udf99\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> (@trekkieb47) <a href=\"https:\/\/twitter.com\/trekkieb47\/status\/831252113548255232?ref_src=twsrc%5Etfw\">February 13, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>After the loud rumblings, Twitter reversed the process two hours after its initial announcement. They tweeted:<\/p>\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">We heard your feedback &#8211; this was a misstep. We\u2019re rolling back the change and we\u2019ll keep listening. <a href=\"https:\/\/t.co\/9ozPS4XlVI\">https:\/\/t.co\/9ozPS4XlVI<\/a><\/p>\n<p>&mdash; Twitter Safety (@TwitterSafety) <a href=\"https:\/\/twitter.com\/TwitterSafety\/status\/831281441082265600?ref_src=twsrc%5Etfw\">February 13, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>Since then, Twitter <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2017\/03\/01\/twitter-adds-more-anti-abuse-measures-focused-on-banning-accounts-silencing-bullying\/\" target=\"_blank\">has made and enforced<\/a> measures in an attempt to curb or end cyberbullying on its platform, such as introducing better content and keyword filtering, making <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/help.twitter.com\/forms\/abusiveuser\" target=\"_blank\">abuse reporting<\/a> more transparent, collapsing \u201clow quality and abusive tweets\u201d to prevent them showing, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.twitter.com\/2016\/progress-on-addressing-online-abuse-in\" target=\"_blank\">upgrading the Mute feature<\/a>, and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2017\/02\/16\/twitter-starts-putting-abusers-in-time-out\/\" target=\"_blank\">temporarily restricting accounts<\/a> when their algorithm deems they&#8217;ve been engaging in bullying behavior.<\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p style=\"text-align:center\">Read: <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/06\/when-trolls-come-in-a-three-piece-suit\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">When trolls come in a three-piece suit<\/a><\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p>According to those interviewed by CNBC, not much has changed to keep Twitter Lists safer. Twitter\u2019s own Support page don\u2019t have a guideline on how to remove oneself from a list. This is unhelpful for someone who is on multiple \u201chit lists.\u201d <\/p>\n<p>So third-party tools have been created to address this challenge. CNBC mentions <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blocktogether.org\/\" target=\"_blank\">Block Together<\/a>, a web app \u201cdesigned to reduce the burden of blocking when many accounts are attacking you, or when a few accounts are attacking many people in your community.\u201d And then there\u2019s <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/chrome.google.com\/webstore\/detail\/twitter-block-chain\/dkkfampndkdnjffkleokegfnibnnjfah?hl=en\" target=\"_blank\">Twitter Block Chain<\/a>, a Chrome app that \u201cblocks all users on a following\/followers page.\u201d<\/p>\n<p>There are pros and cons to using automated blocking tools. Depending on how they work, it\u2019s entirely possible to accidentally take a sledgehammer to a walnut. If a tool looks at followers and their networks, you can end up being blackballed because of a handful of bad follows. You may have muted (but not unfollowed) people long ago; they now contribute to your bad score. <em>Bam!<\/em> You\u2019re potentially on \u201cThe Bad People\u201d list forevermore. It\u2019s somewhat inelegant, which can put people off. <\/p>\n<p>News of the latest improvement on Twitter\u2019s battle against cyberbullying came last April. In a blog post entitled \u201cA healthier Twitter: Progress and more to do,\u201d VP of Twitter Service Donald Hicks and Twitter Product Manager David Gasca revealed <a href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2019\/health-update.html\">the numbers<\/a> that spoke about their progress in addressing this issue, how they\u2019re now taking proactive steps in flagging bullying and not just relying on reports\u2014thus, unburdening the targets from reporting their bullies\u2014and provided an overview of what Twitter users should expect in the future.<\/p>\n<p>Bullying is never cool, and it will never bring about anything positive to either the bully or their targets. Personally, it\u2019s great to see Twitter finally doing something to address the problem that has plagued the platform for years. Fingers crossed that these new measures could also address the misuse of Lists and restore them to whatever glory they may have once had.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/06\/trolls-abuse-twitter-lists-to-collate-their-targets\/\">Trolls abuse Twitter Lists to collate their targets<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/06\/trolls-abuse-twitter-lists-to-collate-their-targets\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Fri, 14 Jun 2019 19:09:39 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/06\/trolls-abuse-twitter-lists-to-collate-their-targets\/' title='Trolls abuse Twitter Lists to collate their targets'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/shutterstock_525954922.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Twitter, like any social network, is faced with the challenge of addressing cyberbullying. And trolls have been abusing the platform\u2019s Lists feature to home in on targets. But have no fear: There are ways to protect users from social attacks, and Twitter is moving to make itself a safer place.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/social-engineering\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/block-together\/\" rel=\"tag\">block together<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cyberbullying\/\" rel=\"tag\">cyberbullying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-harassment\/\" rel=\"tag\">online harassment<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trolling\/\" rel=\"tag\">trolling<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter-block-chain\/\" rel=\"tag\">twitter block chain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/twitter-list-abuse\/\" rel=\"tag\">twitter list abuse<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/06\/trolls-abuse-twitter-lists-to-collate-their-targets\/' title='Trolls abuse Twitter Lists to collate their targets'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/06\/trolls-abuse-twitter-lists-to-collate-their-targets\/\">Trolls abuse Twitter Lists to collate their targets<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22044,6503,12679,10510,21461,22045,22046],"class_list":["post-15581","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-block-together","tag-cyberbullying","tag-online-harassment","tag-social-engineering","tag-trolling","tag-twitter-block-chain","tag-twitter-list-abuse"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15581"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15581\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15581"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}