Meta Is Building A Rival To Twitter 

Meta has shown staff plans for a text-based social network designed to compete with Twitter. With an ambitious list of target users, including the Dalai Lama and Oprah Winfrey, the proposed text-based network could allow users to follow accounts they already follow on Instagram, as well as potentially bring over followers from platforms such as Mastodon.

The standalone app is codenamed Project92 although its public name might be Threads The new standalone App will be based on Instagram and integrate with ActivityPub, the decentralised social media protocol. 

Meta's chief product officer Chris Cox has confirmed that the platform was in development and that coding was under way on the platform. Although no release date was given, there is some speculation that it could be as early as the end of June. Meta says it takes "inspiration" from other products, although others have noted that Stories on Facebook was based on a Snapchat feature, and Reels on Instagram is unmistakably similar to TikTok.

Screenshots have appeared online which were shown internally to employees, potentially giving an idea of what the app will look like. 

Threads / P92 - could turn out to be a greater rival to Elon Musk's Twitter than either BlueSky or Mastodon. While both have attracted users disillusioned with Twitter, starting afresh on a new social network and rebuilding a user  community, is difficult.

If even 25% of Instagram users can be coaxed into using Threads / P92 it will instantly become bigger than its older rival.

Twitter has come under scrutiny months over security on the platform, and in May it withdrew from the EU’s voluntary disinformation code. Under Elon Musk's ownership, Twitter moderation has been reported to have fallen too far and critics say the platform has allowed an increase in the spread of disinformation.

In response, Elon Musk says there is now "less misinformation rather than more" since he took over in October 2022.

As an advertising-reliant business, Twitter has been experiencing problems, including an advertiser boycott triggered by concerns over the deterioration of moderation standards at the platform and a poorly executed relaunch of Twitter’s subscription service, which led to controversy over of verified impersonator accounts. Twitter’s ad revenues in the first week of May were 59% down on the same period last year, reflecting concerns about the platform.

A fresh start on a new social network and rebuilding a community to compete with Twitter would be a challenge, but the Instagram community is enormous -  Meta says it has around two billion users - which is much more than the 300 million that are believed to use Twitter.

Sharecast:     Guardian:    Yahoo:    The Star:   NY Post:    Verge:    BBC

You Might Also Read: 

Musk Threatens To Sue Microsoft:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Two Thirds Of Organizations Suffer Breaches Due To WFH
Cyber Security & The Financial Services Industry »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

SafenSoft (SnS)

SafenSoft (SnS)

SafenSoft delivers high-efficiency, low-impact proactive protection against malware, insider threats, and confidential data leakage.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

ThreatBlockr

ThreatBlockr

ThreatBlockr (previously Bandura Cyber) is the only active defense cybersecurity platform that fully automates the enforcement, deployment and analysis of cyber intelligence at a massive scale.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.