Meta Is Building A Rival To Twitter 

Meta has shown staff plans for a text-based social network designed to compete with Twitter. With an ambitious list of target users, including the Dalai Lama and Oprah Winfrey, the proposed text-based network could allow users to follow accounts they already follow on Instagram, as well as potentially bring over followers from platforms such as Mastodon.

The standalone app is codenamed Project92 although its public name might be Threads The new standalone App will be based on Instagram and integrate with ActivityPub, the decentralised social media protocol. 

Meta's chief product officer Chris Cox has confirmed that the platform was in development and that coding was under way on the platform. Although no release date was given, there is some speculation that it could be as early as the end of June. Meta says it takes "inspiration" from other products, although others have noted that Stories on Facebook was based on a Snapchat feature, and Reels on Instagram is unmistakably similar to TikTok.

Screenshots have appeared online which were shown internally to employees, potentially giving an idea of what the app will look like. 

Threads / P92 - could turn out to be a greater rival to Elon Musk's Twitter than either BlueSky or Mastodon. While both have attracted users disillusioned with Twitter, starting afresh on a new social network and rebuilding a user  community, is difficult.

If even 25% of Instagram users can be coaxed into using Threads / P92 it will instantly become bigger than its older rival.

Twitter has come under scrutiny months over security on the platform, and in May it withdrew from the EU’s voluntary disinformation code. Under Elon Musk's ownership, Twitter moderation has been reported to have fallen too far and critics say the platform has allowed an increase in the spread of disinformation.

In response, Elon Musk says there is now "less misinformation rather than more" since he took over in October 2022.

As an advertising-reliant business, Twitter has been experiencing problems, including an advertiser boycott triggered by concerns over the deterioration of moderation standards at the platform and a poorly executed relaunch of Twitter’s subscription service, which led to controversy over of verified impersonator accounts. Twitter’s ad revenues in the first week of May were 59% down on the same period last year, reflecting concerns about the platform.

A fresh start on a new social network and rebuilding a community to compete with Twitter would be a challenge, but the Instagram community is enormous -  Meta says it has around two billion users - which is much more than the 300 million that are believed to use Twitter.

Sharecast:     Guardian:    Yahoo:    The Star:   NY Post:    Verge:    BBC

You Might Also Read: 

Musk Threatens To Sue Microsoft:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Two Thirds Of Organizations Suffer Breaches Due To WFH
Cyber Security & The Financial Services Industry »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.