Skip to main content

X (Twitter) may implement ID verification to fight impersonators, but will it work?

The implementation of ID verification to Twitter (now known as X) is something that’s been long rumored ever since Elon Musk bought the platform. This new security feature may be coming soon as details on how the verification process will work have recently emerged.

At least potentially. 

This information comes from independent app researcher Nima Owji who shared a screenshot of an in-app window revealing some of the materials Premium users will need to verify their identity. They include a government-issued ID plus a device with a working, uncovered camera – presumably a smartphone. Verification is said to take about five minutes or so. The message also tells people to “be prepared to take a sefie and photos of your ID.” We assume “sefie” is a typo and the platform meant to say “selfie” instead. As you can probably guess, this is still a work in progress; although the fact this message appeared hints at an imminent launch.  

See more

Important context

Looking at the fine print, X will store images of your ID as well as your biometric data on its servers for up to 30 days. During that time, the platform will share your information with identity verification company Au10tix “for the purpose of confirming [your] identity.” Additionally, X will use your data for “safety and security” reasons.

Doing a quick Google search on Au10tix, it looks like the company has a pretty clean rap sheet. It hasn’t had any public data breaches. On the surface, it appears Elon Musk made a good choice in picking Au10tix as a third-party partner. Although given all the controversies that have come as a result of Musk’s decisions, we will remain skeptical.

A launch date is unknown. It is worth mentioning that X’s Community Notes once claimed ID verification is almost here, but Owji’s may have missed some important context. The feature will actually be optional for Premium users. It won’t be a required security check for everyone.

However, during the writing of this article, those same Community Notes were altered to now say X is currently making no statements regarding "site-wide photo ID verification." The image below is the original statement.

X community notes before edits

(Image credit: Future)

Analysis: Just another sticker

The reason why this is being implemented, according to the fine print, is to combat impersonation on X. If you recall, Musk got rid of Twitter’s old verification system to then implement one where all you had to do was pay $8 to get a verified checkmark. This proved to be a disaster as the website soon became filled with fake accounts. Infamously, someone impersonated pharmaceutical company Eli Lily and then proceeded to tweet the corporation was making insulin free of charge. Eli Lily reportedly pulled all of its ads from Twitter, costing the social media platform millions.

The million-dollar question now is will this effectively stop X impersonators? We doubt it. It’s not like anything is really changing. It’s still $8 for verification, optional or not. Even if it was mandatory, would people be okay with giving their biometric data to Musk or some security company they never heard of? The sycophants probably, but that’s not most people.

It may still be just another worthless sticker to add to the collection.



Comments

Popular posts from this blog

Garmin's new radar-equipped tail light will keep you safe on your e-bike

Garmin's Varia bike radars are some of the most popular pieces of cycling tech around – and now the company has delivered its first rearview radar to have been specially designed for some of the best e-Bikes .   Garmin's Varia range mounts to the back of your bike and broadcasts a radar signal behind you, so you can get visual and audible alerts when something's overtaking you. Even better, the new Varia eRTL615 plugs directly into most e-bikes, with no battery required. Because the catchily-named Varia eRTL615 is also a tail light, it'll also make sure you're visible to other vehicles too, promising to emit a flashing or solid light that's visible from up to a mile away in daylight. To connect Garmin's new radar tail light to your e-bike, you'll need to pick the right Garmin adapter cable (which isn't included). You can buy power cables compatible with Bosch, Shimano, or USB-A terminals or connections, with more info on those available on Garmin...

Revolution Software is using their own AI technology to remake Broken Sword

TechRadar Gaming is reporting live from Gamescom 2023 on the latest and greatest developments in gaming and hardware. Revolution Software announced at Gamescom 2023 that Broken Sword would be coming back, with Broken Sword - The Shadow of the Templars getting a full remake while a sixth title in the series is coming in the future too, under the title Broken Sword - Parzival’s Stone .  Speaking to TRG ahead of the announcement, Cecil talked about the studio’s plans for a Broken Sword remake and the sixth title in the series. Cecil is a larger-than-life character, who is able to talk about the studio’s plans with enthusiasm. It even carries a pocketful of stones to illustrate the plans for Parzival’s Stone , but he also talks about how Broken Sword - The Shadow of the Templars would be using AI to upscale.  Cecil wasn’t shy about the studio’s use of AI technology, but he gave a fairly robust explanation of why the game was using it. The AI technology will be used to upda...

Hackers steal passwords, emails from hookup websites

Two gay hookup websites have been breached with sensitive and personal user data stolen and sold online, new reports have claimed. The databases, which are now being sold on dark web forums, were taken from platforms called TruckerSucker, and CityJerks. They contain enough personally identifiable information to engage in identity theft , such as usernames and passwords, email addresses, profile pictures, sexual preferences, birth dates, postal addresses, IP addresses, and bios. The passwords are encrypted, but according to TechCrunch, the algorithm is “weak” and could be broken by a more persistent hacker. The silent treatment HaveIBeenPwned founder Troy Hunt, who was tipped off on the leak, described the incident as a “typical forum breach, albeit with super sensitive content.”  However the content includes more than just identity data, as there are also messages users exchanged, including arranging meetings and describing their sexual preferences.  In total, more than...