Defeating Coordinated Inauthentic Behavior at Scale

It’s highly recommended that you watch this video before continuing to read this article.
  1. The problem faced by media platforms
    a. The public countermeasures discussed, and how attackers are bypassing these countermeasures
  2. Soatok’s Proposal for Solving This Problem

Coordinated Inauthentic Behavior

  1. Extract ad revenue from the platform.
  2. Celebrate having successfully pushed bullshit onto the general public, possibly influencing people’s beliefs.

The Countermeasures Being Employed

The Counter-Countermeasures

Soatok’s Proposal

  1. Creating a blacklist of size infinity, OR
  2. Missing some badness
  1. Attest that certain news-related videos are trustworthy and accurate (or affirm that they are bullshit).
  2. Invite other users to become a volunteer.
  1. Outside the initial seed users (which, for example, could be selected from college professors and graduate students at public universities), every volunteer must be invited by another user.
  2. Every attestation must be linked back to the volunteer vetter’s account for transparency and accountability.
  3. If any users are found to be abusing their vetting privilege, they will be removed. If several abusers were invited by the same user, YouTube may also remove the ability for the common parent in the nested tree of volunteers to invite future users. All of their peers should similarly be investigated.
  4. In order to move from unvetted to vetted status, several positive attestations must be provided from users whose distance from a common parent is either undefined (i.e. different seed users, so different trees entirely) or greater than 2.
  5. Any edge cases should be escalated past the volunteer vetters to the usual YouTube moderation staff.

Will anyone volunteer?

Can we incentivize users to volunteer?

What about anything that slips through the cracks?

Are University professors the best seed to select?




Soatok is a furry programmer and hacker. Blog: Website:

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Helping With Testnet

Hackers Target Home Workers. What to do.

SSRF Internal resource accessing & Bypassing Filter (CTF)

Say hello to the newest member of the TAF Token Te

Maverick Protocol Testnet Feedback

Abusing ACL Permissions to Overwrite other User’s Uploaded Files/Videos on s3 Bucket

{UPDATE} Dino Tim: Aprender los números Hack Free Resources Generator

The Importance of Accurate Security Guidance

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Soatok Dreamseeker

Soatok Dreamseeker

Soatok is a furry programmer and hacker. Blog: Website:

More from Medium

Applications of Huffman Coding

Unicode and Hexadecimal Simplified

#EDA Enough already with ‘Event Streaming’ **

Comsnets2022 and my learnings and experience.