Online privacy and safety are feminist issues
Twitter/X will use information from public tweets to help train its machine learning and AI models. This means Twitter/X has the right to pirate and modify content using AI then sell it. It’s also important to remember that since Musk took over, Twitter/X has access to DMs.
The risk of AI having access to public posts on Twitter, and potentially manipulating or generating content based on that access, raises several concerns and challenges:
Privacy Concerns: AI systems that have access to public posts may inadvertently expose sensitive information about individuals. While the content is public, it could still be used in ways that violate users’ expectations of privacy. AI could be used to analyze and interpret public posts in ways that infringe on individuals’ privacy. For example, it might be used to predict personal information about users based on their public activity.
Misinformation and Disinformation: AI systems could be used to generate false or misleading content that appears to come from real users. This could exacerbate the spread of misinformation and disinformation, which is already a significant problem on Twitter (and other platforms).
Impersonation: AI systems might be used to impersonate individuals, including public figures, by generating content that mimics their writing style and opinions.
To mitigate risks of privacy breaches by Twitter/X, defenders can take several precautions:
- When possible, use pseudonyms and avoid sharing personally identifiable information on your profiles.
- Use throwaway email for your account.
- Do not use direct messages when discussing sensitive information. Instead, use end-to-end encrypted messaging platforms for more secure communication within activist networks.
- Disable location services when tweeting sensitive information from protests or events.
- Enable two-factor authentication to secure your accounts.
- Regularly review and adjust privacy settings on your Twitter accounts.
- Be cautious about the third-party apps you use and what permissions you grant.