Security & Privacy
The Guardian reported yesterday, in an exclusive from Twitter, that the social network will be introducing a tagging system to prevent child porn images being posted.
Unfortunately, the current Twitter ecosystem sees millions of child abuse pictures posted among the millions of tweets sent every day.
The Online Trust Alliance’s 2013 Honor Roll report, a comprehensive audit of the Internet’s most visible companies, has given Twitter the stamp of approval for voluntary best practices, consumer protection and self-regulation.
Read on to see how Twitter came out on top in the OTA audit, and other key takeaways from the report.
Did you know the Visual Insights team at Twitter is “obsessed with the patterns that emerge from aggregated tweets over time?” Well, they are.
That explains (to those of us who are paranoid) why the “tweet location” option keeps mysteriously activating itself despite pointed attempts to disable it permanently.
And . . . there’s more.
Do you live in fear of the Syrian Electronic Army hacking your Twitter account? Or do you have a CEO with less than stellar social media skills? Or maybe you belong on our Twit List as someone who outsources “social” to interns and kinda deserve whatever public embarrassment you get.
But regardless of the scenario, a little Twitter security couldn’t hurt. For at the end of the day, even the most savvy social-ites are at risk.
And guess what? Hootsuite’s got yo’ back: