Twitter Threatens To Sue Meta Over Threads App

Twitter is threatening legal action against Meta over its popular rival app called Threads accusing the social media giant of poaching former employees to create a “copycat” application. Threads, which was launched to millions recently, is similar to Twitter and has been pitched by Meta bosses as a "friendly" alternative. 

The app, which was created by the company's Instagram team, comes when many people are looking for Twitter alternatives.

An attorney for Twitter describing as a "copycat" app allegedly developed by hiring former employees of the micro-blogging platform owned by Elon Musk and using the company's trade secrets, according to a letter posted on the Semafor news website.  

Twitter's Elon Musk said "competition is fine, cheating is not", but Meta denied claims in a legal letter that ex-Twitter staff helped create Threads. 

So far, nearly 100 million people are claimed  have signed up for the new app,compared to the  estimated 350 million users on Twitter. It took Twitter four years to build the same number of users that Threads gained in a day - though Twitter grew its users from scratch, while Threads was able to cross-promote itself to the pre-existing 2 billion users already on Instagram.   

US copyright law does not protect ideas, so for Twitter to be successful in court it would have to prove that its own intellectual property, such as programming code, was used.

Just over a decade ago Meta was given a patent for "communicating a newsfeed" the system that displays all the latest posts when Facebook is used. Twitter CEO Linda Yaccarino said in a recent tweet that while the platform, is "often imitated" it "can never be duplicated".  

Recently both Meta and Twitter have started a large number of layoffs, with Meta announcing in April that it would cut staff levels by approximately 10,000. Twitter lost a large proportion of its 7,500 employees, as high as 80%, in waves of redundancies following Mr Musk's takeover last October.

Threads:    BBC:    NYTimes:    Endgadget:    CBS:    ITV:     Standard:    Statista:     Rolling Stone

Semafor:   Guardian:     Image: Bastian Riccardi on Unsplash

You Might Also Read: 

Meta Will Contest EU $1.3B Data Privacy Fine:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A “Whole-of-Society" Approach To Cyber Crime
SCADA Is Dead, Or Is It? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Superus Careers - Cyber Career Exchange

Superus Careers - Cyber Career Exchange

The Cyber Career Exchange is a specialized recruiting platform focused specifically on cybersecurity.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.

Sciber

Sciber

Sciber - data-driven cybersecurity. Strengthen your cyber defence with proactive, science-based and improvement-driven services.