Thursday, 4 December 2025
25.2 C
Singapore
24.6 C
Thailand
20.9 C
Indonesia
26.6 C
Philippines

Bluesky tightens rules to combat impersonation and handle misuse

Bluesky updates the impersonation policy to combat misuse and introduces stricter rules for parody accounts, identity churning, and handling verification.

Bluesky, the emerging social media platform, has introduced a stricter impersonation policy following concerns raised about verification challenges on the app. The platform’s safety team recently announced that accounts impersonating others or squatting on handles are now being removed more aggressively. This move comes after a third-party analysis highlighted how Bluesky’s lack of a conventional verification system makes it easy for users to pose as others, potentially for scams or to seek attention.

1/ With more users joining Bluesky, we know how important it is to identify which accounts are real. Users deserve confidence that the accounts they interact with are authentic. Sharing some details about our impersonation policy 🧵

— Bluesky Safety (@safety.bsky.app) November 30, 2024 at 4:46 AM

Simplifying the path to account verification

Unlike many platforms that offer verification through a simple paid checkmark, Bluesky uses a unique self-verification process. Users can prove their identity by linking their account to a domain name. This involves adding a specific text string to the domain’s DNS record, confirming ownership of a particular URL.

Bluesky offers a custom domain service for individuals without a personal domain as an alternative. The platform has also begun collaborating with high-profile individuals and organisations to streamline verified handle setups. While effective, this verification method is more complex than users might hope, creating opportunities for impostors to exploit the system.

Addressing new challenges from a growing user base

Bluesky’s verification issues became more apparent with a surge in new users. Research conducted by Alexios Mantzarlis from Cornell Tech revealed that 44 per cent of the 100 most-followed accounts on Bluesky have impersonators. This troubling statistic pushed the platform to implement additional measures.

Under the updated policy, parody, satire, or fan accounts must identify themselves in their usernames and bios. This requirement ensures that these accounts are treated as impersonators and removed. The new rules are designed to prevent ambiguity and ensure that users know the nature of the accounts they interact with.

Bluesky has also cracked down on “identity churning,” where users create impersonator accounts to attract followers, only to change their identity later to bypass bans. These accounts will now be permanently removed, regardless of their attempts to rebrand.

Looking ahead to improved verification tools

Bluesky has acknowledged that more than these changes are needed to address the issue. The platform is actively exploring additional tools to enhance account verification. However, these solutions are still in development, and Bluesky must provide a timeline for their release.

Bluesky aims to build a safer community for its users by tightening its rules and exploring better verification options. While challenges remain, these steps clearly indicate the platform’s commitment to tackling impersonation and enhancing user trust.

Hot this week

Asia PGI unveils AI-powered PathGen outbreak intelligence platform

Asia PGI previews PathGen, a new AI-powered outbreak intelligence tool designed to speed up disease detection and response across Asia.

AMD powers Zyphra’s large-scale AI training milestone

Zyphra trains its ZAYA1 foundation model entirely on AMD hardware, marking a major step for large-scale AI development.

Sony launches the Alpha 7 V with new sensor, AI-powered processing and enhanced reliability

Sony introduces the Alpha 7 V with a new 33MP sensor, updated AI processing and enhanced reliability for photography and video.

AI browsers vulnerable to covert hacks using simple URL fragments, experts warn

Experts warn AI browsers can be hacked with hidden URL fragments, posing risks invisible to traditional security measures.

Apple is expected to overtake Samsung as the world’s leading smartphone maker

Apple is projected to overtake Samsung as the world’s top smartphone maker, driven by strong iPhone 17 demand and upcoming device launches.

HPE expands AI-native networking portfolio and outlines vision for self-driving IT operations

HPE expands its AI-native networking portfolio with new AIOps features, hardware, and hybrid cloud tools designed for self-driving IT operations.

Kyndryl and Microsoft report rising sustainability commitment among Singapore businesses

Most Singapore businesses are expanding sustainability efforts but face challenges with data quality and limited AI adoption.

UnionBank adopts Amazon Quick Suite to accelerate data-driven decision making

UnionBank deploys Amazon Quick Suite to expand access to data analytics and speed up decision making across its organisation.

Kargo Technologies outlines plan for 40,000-vehicle EV shift by 2035

Kargo Technologies sets a 2035 target to deploy 40,000 electric vehicles and build an AI-driven Electrified Silk Road across Asia.

Related Articles

Popular Categories