If they think keeping the API closed down or closing it down even more, is an effective defence against the bots… They need a quick refresher course in why the Analog Hole makes perfect DRM impossible outside of completely controlled circumstances.
Even if you required a dedicated twitter device per account, and no api at all… no more twitter website even or read only website … then you would get people building robots to touch the screen as fast as possible to “physically automate “ the devices… if you limit that device to only having one account associated with it, you would need a way to deauthorise a device for when you sell it or upgrade to a new one, so they would just automate the deauthorise workflows and “load balance” across any necessary size pool of devices.
Any efforts like this will drastically increase user friction and drive away customers/users. Simultaneously as far as they go down this path there will be (as long as twitter is still considered relevant, at least) … be state funded propaganda organisations who’s interests align with funding such a device farm, and simultaneously they would want deniability so the operators of such twitter device farms would wind up in the sort of ethically dubious zone as companies like Pegasus group (examples because its after midnight and I don’t feel like looking up exact details, consider these hypothetical examples unless they are correct) selling their hardware to “legitimate governments” to perform a once off inspection of the phone data of someone crossing the border into the USA at JFK airport in New York, and also to counties like Saudi Arabia to hack and monitor dissidents round the clock by installing root kits/exploits.
Effectively there’s no point, they should open up the api and monitor it better.
Even if you required a dedicated twitter device per account, and no api at all… no more twitter website even or read only website … then you would get people building robots to touch the screen as fast as possible to “physically automate “ the devices… if you limit that device to only having one account associated with it, you would need a way to deauthorise a device for when you sell it or upgrade to a new one, so they would just automate the deauthorise workflows and “load balance” across any necessary size pool of devices.
Any efforts like this will drastically increase user friction and drive away customers/users. Simultaneously as far as they go down this path there will be (as long as twitter is still considered relevant, at least) … be state funded propaganda organisations who’s interests align with funding such a device farm, and simultaneously they would want deniability so the operators of such twitter device farms would wind up in the sort of ethically dubious zone as companies like Pegasus group (examples because its after midnight and I don’t feel like looking up exact details, consider these hypothetical examples unless they are correct) selling their hardware to “legitimate governments” to perform a once off inspection of the phone data of someone crossing the border into the USA at JFK airport in New York, and also to counties like Saudi Arabia to hack and monitor dissidents round the clock by installing root kits/exploits.
Effectively there’s no point, they should open up the api and monitor it better.