Twitter trolls targeted with automated life tips
Zero Trollerance uses clever disappearing bots to find those using sexist language
A German group has set up a bot-based system to attack tweeters using offensive language using bot.
Peng! Collective is using its system, dubbed Zero Trollerance, to scan Twitter users it believes are promoting sexist tweets and bombards them with messages as a warning.
Zero Trollerance monitors users posting tweets including one of hundreds of words it considers offensive. When the bot spots one, it logs the user's Twitter handle and records it in a database. Another set of bots then starts auto tweeting the offending user self-help tips to try and correct the behaviour.
The collective hopes that by the time they receive the final tip, they will be a reformed character, never to offend on the social network again.
In fact, the group's website features one testimony, reading: "Day one: shock. Day two: feeling lost and alone. So angry! Day six: reborn, and full of love. Thank you, Zero Trollerance!"
What is interesting to note is that these bots can operate without Twitter banning them, even thought the social network has a policy of banning any bots. The developer of the system said they can get round this rule by using 'disappearing' bots that, after logging a username or bombarding the offender with tweets, disappears and is then replaced with another bot.
The website said: "Zero Trollerance is a self-help journey designed by guru Adler King in consultation with reformed trolls. Adler's team of Troll Coaches are constantly analysing Twitter and enrolling new trolls in the program where they are led through an intensive process of self excavation and given practical tools to overcome their inner hurdles. For trolls, this is the first step towards a new life."
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download