Close Menu
geekfence.comgeekfence.com
    What's Hot

    Astronomy student discovers second planet around young star

    March 24, 2026

    Airtel Tests Starlink to Connect 4G Phones Even Without Network Signal

    March 24, 2026

    Identifying Interactions at Scale for LLMs – The Berkeley Artificial Intelligence Research Blog

    March 24, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Mobile»Security Bite: X going open-source is bad news for anonymous alt accounts
    Mobile

    Security Bite: X going open-source is bad news for anonymous alt accounts

    AdminBy AdminFebruary 1, 2026No Comments3 Mins Read3 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Security Bite: X going open-source is bad news for anonymous alt accounts
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Twitter handles | Abstract @ image

    9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


    Amid the heap of an EU fine levied on X earlier this month, Elon Musk announced that the platform’s entire recommendation algorithm would go open source. Seemingly to help cool the regulatory waters by providing greater transparency into how the social media giant organizes users’ timelines.

    Usually, IT professionals would see news around something going open source, smile, and move on with their lives. But last week, I came across an interesting thread on none other than X that explains how this move can actually expose anonymous alt accounts through “behavioral fingerprints”…for better or worse.

    An OSINT aficionado under the handle @Harrris0n on X recently posted about his findings while digging through the platform’s now-open-source recommendation code. What he found is a bit terrifying if you care about privacy or if you operate an entire network of bot accounts.

    Buried in X’s repo was something called the “User Action Sequence.”

    This isn’t a mere log either. It’s a transformer context that encodes your entire behavioral history on the platform. It tracks the specific milliseconds you pause to scroll, the type of accounts that trigger a block, the specific flavor of content you’re into, and the exact moment you interact with it. It represents thousands of individual data points collected by the time you see your first cat post.

    Now, here’s where it gets fascinating. X uses this sequence to predict engagement (basically serving the most relevant content to keep you on the platform), while simultaneously creating a high-fidelity behavioral fingerprint.

    Harrison found that if you run this encoding on a known account and then compare it against thousands of anonymous accounts using something the repo calls “Candidate Isolation,” you get matches. Abnormally high matches. He even laid out the specific recipe needed to build this de-anonymization tool, and the barrier to entry here is very low.

    According to his thread, all someone needs is the action sequence encoder (which the X repo just handed over), an embedding similarity search, and a little bit of luck (lol). The only missing piece for most people is the training data of confirmed alt accounts, but Harrison notes he already has that from years of threat actor tracking.

    Theoretically, you can map that same behavioral fingerprint from a public X user to an anonymous one, or potentially even cross-platform to accounts on Reddit and Discord. It goes to show that you can easily change your username, but it’s much harder to change your habits.

    So, is a burner account truly anonymous? I’ll let you decide.

    I wanted to share this thread here on Security Bite because it’s a sobering reminder that these algorithms often know you better than you know yourself. And that digital version of you is still vulnerable.


    Subscribe to the 9to5Mac Security Bite podcast for biweekly deep dives and interviews with leading Apple security researchers and experts:

    Add 9to5Mac as a preferred source on Google
    Add 9to5Mac as a preferred source on Google

    FTC: We use income earning auto affiliate links. More.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    OnePlus 15T arrives with Snapdragon 8 Elite Gen 5 and 7,500mAh Si-C battery

    March 24, 2026

    San Francisco With Galaxy S26 Ultra – Samsung Global Newsroom

    March 22, 2026

    I Tested a Low-Cost Phone With One of the Biggest Batteries We’ve Seen Yet

    March 21, 2026

    Balancing openness and choice with safety

    March 20, 2026

    Google Maps could soon get a long-overdue upgrade that replaces WhatsApp and Google Messages for location sharing – here’s how it’ll work

    March 19, 2026

    Google might be undoing some controversial changes to the Photos app

    March 18, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202524 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202622 Views

    The Complete Guide to Model Context Protocol

    October 29, 202515 Views
    Don't Miss

    Astronomy student discovers second planet around young star

    March 24, 2026

    An international team of astronomers, led by a PhD student at University of Galway, have…

    Airtel Tests Starlink to Connect 4G Phones Even Without Network Signal

    March 24, 2026

    Identifying Interactions at Scale for LLMs – The Berkeley Artificial Intelligence Research Blog

    March 24, 2026

    Setting the Stage for Learning

    March 24, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Astronomy student discovers second planet around young star

    March 24, 2026

    Airtel Tests Starlink to Connect 4G Phones Even Without Network Signal

    March 24, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.