Twitter Now Allows Open Direct Messaging: Time to Rethink Your Privacy Settings
If you don’t want to receive direct messages from other random Twitter users, now’s the time to opt out. Twitter recently announced an overhaul on how their direct messaging feature works. The service now allows anyone to send direct messages (DM) to anyone else, regardless if they are connected or not. By default, Twitter direct messaging happens only between users who follow each other, making it difficult to communicate if only one person followed the other.
According to the update, this new messaging system makes it easier for you to communicate one-on-one or with a chosen group of people anywhere in the world. This current implementation has some privacy implications for those who are a little bit more concerned about receiving DMs from strangers. Because of this new DM capability, users no longer need to virtually shake hands in order to send direct messages to each other, allowing for more unwanted DMs, or potential private abuse and nuisances.
On the one hand, the new DM update could be useful to celebrities (verified accounts), or for brands and organizations that want a convenient line of communication with the public, as well as companies who use the platform for customer support without having to send a public tweet. On the other hand, it could be an annoyance for ordinary users, making the original DM setup more ideal as it not only created a personal DM space, but it served as a good barrier against spam as well.
While the update might serve as a good opportunity for some, it could be overwhelming for others. The good news is, if you’re part of the latter, you can adjust your DM settings and choose to keep your messages private. If you want to “opt in” in the future, you can switch to the new DM update feature.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: Trigona
- Steering Clear of Security Blind Spots: What SOCs Need to Know
- Understanding the Kubernetes Security Triad: Image Scanning, Admission Controllers, and Runtime Security
- Preempting Threats to Connected Cars: The Importance of Cybersecurity in a Data-Driven Automotive Ecosystem
- Your Stolen Data for Sale