Securing Your Conversations: An In-Depth Look at Twitter’s New Encrypted Direct Messages

Twitter recently launched a new feature called “Encrypted Direct Messages”, which allows users to send and receive private messages in a fully encrypted form. Currently, this new feature is only available to verified Twitter users. Encrypted Direct Messages (DMs) provide an added layer of security and privacy in conversations, and they differ from regular DMs by the way they are encrypted.

Access to encrypted direct messages

Currently, Encrypted Direct Messages are only available to verified Twitter users, which includes Twitter Blue subscribers and those who are part of a “Verified Organization.” To become a verified user on Twitter, one has to apply through the verification process. Twitter verifies accounts that are of public interest, mainly in categories such as journalism, politics, business, and entertainment. The verification process requires users to provide authentic identification documents and wait for the Twitter team to review and approve their application.

Verification requirements

To be able to send and receive encrypted direct messages, both the sender and the recipient must be verified Twitter users or affiliates of a verified organization. That means, for institutions, organizations, and teams, all members must go through a verification process before they can join the group’s encrypted message room. Twitter’s algorithm checks whether the sender and recipient are verified before allowing access to encrypted direct messages.

Sending Encrypted Messages

Sending encrypted direct messages is as simple as sending a regular DM. Once the user is verified, sending an encrypted message can be done by opening a new conversation, typing a message, and pressing the send button. Users get immediate feedback that the conversation is encrypted based on the lock icon badge that appears on the avatar of the user they are talking to.

Visual Differentiation

The lock icon serves as the main visual differentiation between Encrypted Direct Messages and regular DMs on Twitter. When users send and receive encrypted messages, they can see that their conversations are secure by the lock icon that appears beside their conversations. This icon acts as both visual feedback and documentation that conversations are encrypted, and can be used as proof of compliance.

Limitations of encrypted messages

Encrypted Direct Messages on Twitter come with some limitations. First, only one recipient can receive encrypted messages. Second, metadata such as recipient, creation time, and other details are not encrypted, and neither is any linked content. This means that while the primary content is secure, the context is still visible. Third, once an encrypted conversation has been initiated, new devices cannot be added and the same passwords will encrypt all communication sessions. Finally, Twitter limits encrypted messages to a maximum of ten devices per user, meaning that users cannot have more than ten conversations at a time on different devices.

Reporting Encrypted Messages

Due to the encryption of the conversation, reporting an encrypted message to Twitter is currently not possible. Reporting a message requires access to its content, and since encrypted messages are secured from unauthorized access, any form of reporting would lead to a breach of confidentiality.

Encrypted Direct Messages is a valuable feature that adds an additional layer of privacy and protection to communications on Twitter. This feature comes in handy for users who value privacy, are part of verified organizations, or have Twitter Blue subscriptions. However, there are limitations that make it unsuitable for all situations, and verified users should be cautious when sending any sensitive information through the platform. Nonetheless, Encrypted Direct Messages are a welcome addition to the Twitterverse, giving users more control over their conversations and their privacy.

Explore more

Can Readers Tell Your Email Is AI-Written?

The Rise of the Robotic Inbox: Identifying AI in Your Emails The seemingly personal message that just landed in your inbox was likely crafted by an algorithm, and the subtle cues it contains are becoming easier for recipients to spot. As artificial intelligence becomes a cornerstone of digital marketing, the sheer volume of automated content has created a new challenge

AI Made Attention Cheap and Connection Priceless

The most profound impact of artificial intelligence has not been the automation of creation, but the subsequent inflation of attention, forcing a fundamental revaluation of what it means to be heard in a world filled with digital noise. As intelligent systems seamlessly integrate into every facet of digital life, the friction traditionally associated with producing and distributing content has all

Email Marketing Platforms – Review

The persistent, quiet power of the email inbox continues to defy predictions of its demise, anchoring itself as the central nervous system of modern digital communication strategies. This review will explore the evolution of these platforms, their key features, performance metrics, and the impact they have had on various business applications. The purpose of this review is to provide a

Trend Analysis: Sustainable E-commerce Logistics

The convenience of a world delivered to our doorstep has unboxed a complex environmental puzzle, one where every cardboard box and delivery van journey carries a hidden ecological price tag. The global e-commerce boom offers unparalleled choice but at a significant environmental cost, from carbon-intensive last-mile deliveries to mountains of single-use packaging. As consumers and regulators demand greater accountability for

BNPL Use Can Jeopardize Your Mortgage Approval

Introduction The seemingly harmless “pay in four” option at checkout could be the unexpected hurdle that stands between you and your dream home. As Buy Now, Pay Later (BNPL) services become a common feature of online shopping, many consumers are unaware of the potential consequences these small debts can have on major financial goals. This article explores the hidden risks