Meta Plans A Rival To Twitter 

Meta, the parent firm of Facebook and Instagram, is working on a new standalone, text-based social network app in its bid to displace Twitter as the global market square. The aim is to rival both Twitter and its decentralised competitor, Mastodon. Twitter has been struggling to hold on to its advertising base since Musk took over the platform in 2022. 

Numerous corporate advertisers have withdrawn spending following Twitter's move to restore suspended accounts and release a paid account verification which resulted in scammers impersonating firms. A Twitter-like app would allow Meta to take advantage of the current problems with the Elon Musk management of the company, where operational changes and cost-cutting have been having an impact on users' experience.  

Meta's app will be based on a similar framework to the one that powers Mastodon, a Twitter-like service which was launched in 2016 its user base from 300,000 users to more than 2.5 million in the weeks after Musk completed his acquisition of Twitter in late October. Twitter's growth has slowed in recent months, in part as users struggle with the somewhat less user-friendly nature of a the platform resulting from Musk's changes to the platform. 

Meta's new app will be decentralised and designed to be unable be run in the form of a single entity - a similar concept to Mastodon and comes at a time when its biggest platform, Facebook, is struggling to attract the attention of a younger audience.

Meta has been preoccupied investing in the Metaverse, a virtual world where users interact and work - which has yet to come to fruition. Its video-sharing app, Instagram, is also facing stiff competition as content makers or hit influencers abandon the platform for TikTok. To date it is unclear when Meta will launch the new app.

Mastodon:     Reuters:     BBC:      CNN:       Daily Mail:        Sky:      NYPost:    Mashable:  

You Might Also Read: 

Digital Platform Regulation - Impossible?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Conflict Drives A Significant Increase In DDoS Attacks
Ransomware Gang Claims Responsibility For The Attack On Oakland »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.