• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Middle East cyberwar

    Cyber-Kinetic Warfare Escalates as Iran, US, and Israel Clash Across Military and Digital Fronts

    mandatory cybersecurity requirements

    Home Routers in Singapore Must Meet Higher Security Standards by 2027

    UH Cancer Center cyberattack

    University of Hawaii Cancer Center Breach Exposes SSNs of 87,000+ Participants

    Ring camera doorbells

    Ring Camera Doorbell Ad Triggers Privacy Concerns and Public Criticism in America

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    weekly roundup The Cyber Express

    The Cyber Express Weekly Roundup: Space Security, Malware & Regulatory Alerts

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    NIS2 Directive

    National Cyber Security Bill and NIS2: Senior Management’s Compliance Guide

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    CISCO SD-WAN, Cisco, SD-WAN, CISA, ASD, Zero-Day

    Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection

    age verification technologies

    FTC Clarifies COPPA Stance, Backs Age Verification Technologies for Platforms

    scam centers in Southeast Asia

    Scam Centers in Southeast Asia Drive Billion-Dollar Losses: FBI

    Digital Services Act

    X vs EU: Platform Appeals Against €120M Digital Services Act Penalty

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Middle East cyberwar

    Cyber-Kinetic Warfare Escalates as Iran, US, and Israel Clash Across Military and Digital Fronts

    mandatory cybersecurity requirements

    Home Routers in Singapore Must Meet Higher Security Standards by 2027

    UH Cancer Center cyberattack

    University of Hawaii Cancer Center Breach Exposes SSNs of 87,000+ Participants

    Ring camera doorbells

    Ring Camera Doorbell Ad Triggers Privacy Concerns and Public Criticism in America

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    weekly roundup The Cyber Express

    The Cyber Express Weekly Roundup: Space Security, Malware & Regulatory Alerts

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    NIS2 Directive

    National Cyber Security Bill and NIS2: Senior Management’s Compliance Guide

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    CISCO SD-WAN, Cisco, SD-WAN, CISA, ASD, Zero-Day

    Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection

    age verification technologies

    FTC Clarifies COPPA Stance, Backs Age Verification Technologies for Platforms

    scam centers in Southeast Asia

    Scam Centers in Southeast Asia Drive Billion-Dollar Losses: FBI

    Digital Services Act

    X vs EU: Platform Appeals Against €120M Digital Services Act Penalty

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Twitter vs. Threads – Is Anyone Protecting Your Privacy?

With Instagram Threads, the new offering from Meta, amassing over 30 million accounts in just a day, the question arises: Is it truly secure?

Editorial by Editorial
July 17, 2024
in Features, Firewall Daily
0
Twitter vs. Threads, Twitter vs Instagram threads
654
SHARES
3.6k
VIEWS
Share on LinkedInShare on Twitter

When Victoria Effer, Dublin Co-Lead of Women@LinkedIn, posted on LinkedIn about her new account in “Threads, an Instagram app”, the new social media platform launched by Meta, most of her contacts wanted to know how. 

How did she manage to get an account despite being in the EU territory, where Instagram Threads is currently unavailable? 

She was just the latest among several EU residents who managed to find workarounds to obtain a Threads account. 

Instagram Threads has not yet been launched in the European Union, and there is uncertainty whether it will ever be available in the region.  

This is primarily due to the EU’s stringent privacy regulations, which are more stringent compared to many other countries.  

Meta, the company behind Threads, has faced challenges in complying with these regulations in recent years.  

report-ad-banner

It is worth noting that the European Union did not directly block the app’s launch; rather, Meta is taking precautionary measures and being careful before introducing Threads in the EU. 

Twitter vs. Threads
(Source: Twitter)

Twitter vs. Threads vs. data privacy: Why this hue and cry? 

It’s been hardly a day since Threads was launched by Facebook’s parent company, Meta, but it already has more than 30 million accounts. And many have started to pitch Twitter vs. Threads to understand where the two social media apps lie in terms of privacy. 

It has also managed to raise significant privacy concerns, particularly in the European Union (EU).  

The Cyber Express did a reconnaissance of the situation. Here are the red flags that we managed to spot. 

Collection of sensitive personal information: 

Threads collects highly sensitive personal information, including sexual orientation, race, ethnicity, biometric data, trade union membership, pregnancy status, politics, and religious beliefs. 

This data may potentially be shared with “service providers” and “analytics partners,” which often refers to third-party advertising and marketing firms. 

The sharing of such sensitive data raises concerns about user privacy and the potential for unauthorized use or exploitation. 

Collection of employment-related data: 

Threads collects information about users’ employment, such as their company, role on the team, job history, and performance evaluations. 

This data may be shared with third parties, raising concerns about the confidentiality of employment-related information and potential misuse of such data. 

Collection of body-related data: 

Threads collects data about users’ health, fitness, and exercise habits, which may be shared with third parties. 

The collection of such data raises concerns about privacy, as health-related information is highly sensitive and requires special protection. 

Collection of web activity data: 

Threads may collect users’ browsing history, web page interactions (including with ads), and the referring web page or source through which they accessed Threads links. 

This information may be shared with third parties, potentially compromising user privacy and allowing for targeted advertising based on browsing behavior. 

Collection of location data: 

Threads may collect users’ location data, including photos, videos, or other recordings of their environment and IP-address-based location information. 

This data may be shared with third parties, raising concerns about tracking and surveillance, as well as potential misuse or unauthorized access to location information. 

The killer, of all, is this: 

Inability to delete Threads without deleting Instagram: 

The platform is named “Threads, an Instagram app” for a reason. Instagram is literally the entry point to the app. Once a user commits to Threads, they cannot delete it without also deleting their Instagram account. 

This lack of independent control over Threads raises concerns about user autonomy and the difficulty of disengaging from the platform while maintaining access to other services. 

Why would EU take stock of the Instagram Threads data privacy situation? 

Threads’ data collection practices, particularly regarding sensitive information, may violate the General Data Protection Regulation (GDPR) and other data protection regulations in the EU. 

Meta’s reliance on behavioral advertising and profiling users without explicit consent is not in line with current EU regulations and may face penalties under the DMA (Digital Markets Act) and DSA (Digital Services Act). 

The absence of a general up-front choice to deny tracking and profiling, as well as the lack of specific permission for processing sensitive data, raises concerns about privacy compliance. 

The European Court of Justice ruled against Facebook’s targeted ad model, questioning its justification of using “legitimate interest” to process user data for advertising purposes. 

EU watchdogs can consider data privacy violations by tech giants in antitrust investigations, which adds further scrutiny to Meta’s practices. 

Meta has been fined €1.2 billion and barred from transferring user data from the EU to the US, posing significant obstacles to Threads’ launch in the EU and raising doubts about its future in the region. 

Meta itself faces legal uncertainty due to the incoming DMA regulations, which may restrict the sharing of user data across different platforms. 

The central enforcement of penalties under the DMA, with fines up to 10% of global annual turnover, poses significant financial risks for Meta’s data-driven business model. 

Meta may be more comfortable with legal risks in the UK – its largest market in Europe in terms of accounts open – due to the ICO’s historically inactive approach to systemic breaches. 

The regulatory landscape in the UK differs from that of the EU, thanks to Brexit. 

However, the UK’s plan to weaken domestic data protection standards and erode the independence of the ICO may have implications for privacy protections in the future. 

Twitter vs. Threads: Is Twitter Under Threat? 

Most of the sore points listed for Instagram Threads, incidentally, is applicable to literally all popular social media platforms. 

The collection of sensitive personal information, employment-related data, body-related data, web activity data, and location data happens across all, and its potential unauthorized use is a universal threat.  

Then why this special attention on Threads? Was Twitter – the obvious competition – any better? Is the  

Twitter, across is 15 years of existence, raised these issues across the world. 

Data collection and usage: 

Similar to Threads, and almost all other social media platforms, Twitter collects a significant amount of user data, including personal information, posts, interactions, and browsing behavior. 

Twitter analyzes user data to personalize the content of users’ timelines, suggest accounts to follow, and serve targeted ads based on users’ interests and behavior. 

Concerns arise regarding how Twitter uses this data for targeted advertising, data mining, and profiling users. 

Public nature of tweets: 

Users often forget that tweets are public by default, leading to concerns about the potential for misuse or exploitation of shared information. 

Users may inadvertently share sensitive personal details, opinions, or location information that can be accessed by anyone. 

Imagine a user tweeting about their vacation plans, including the dates and the location they will be visiting. This information can potentially be used by malicious individuals for stalking or targeting purposes. 

To be fair, it is a user issue than a platform issue. Twitter has the provision of keeping the tweets private. However, we still be sharing some information with our network, and all information with Meta and its affiliates. 

Data sharing with third parties: 

Users are concerned about Twitter’s data-sharing practices with third-party companies, advertisers, and analytics firms. 

Sharing user data with these entities raises questions about user consent, control over personal information, and the potential for data misuse. 

Twitter provides APIs (Application Programming Interfaces) that allow developers and third-party apps to access user data. Users worry that these third parties may have access to their personal information without their explicit knowledge or consent. 

Retention and handling of deleted tweets: 

Like Facebook, keeping a handle inactive or deleting it altogether does not remove your activity data. 

Concerns about how Twitter retains and handles deleted tweets, including whether they are completely removed from Twitter’s servers, is rife.  

Twitter itself is ambiguous about how it handles such data and how its associates will use it, considering that more than 10% of its 2022 revenue came through data licensing. 

Users worry about the potential for deleted tweets to resurface or be used in ways they did not anticipate. 

A user who deletes a tweet containing sensitive personal information assumes that it is permanently removed. However, there is uncertainty about how long the tweet remains in Twitter’s servers or if it may still be accessible through other means. 

Lack of transparency: 

Users raise concerns about the lack of transparency regarding Twitter’s data practices, algorithms, and how user information is used. 

Users often feel uncertain about how their data is processed and whether they have control over their privacy settings. 

In the post-Musk era, how Twitter’s algorithms that determine the content users see in their timelines or the ads they are served is expected to change drastically. The lack of clear explanations can lead to suspicions of data manipulation or biased content presentation. 

Threads, Twitter and data privacy: Epilogue 

It is safe to say that both Twitter and Threads face significant privacy issues. Twitter’s issues are about data collection, public nature of tweets, security risks, data sharing with third parties, retention of deleted tweets, and lack of transparency.  

Threads, on the other hand, is in the red regarding the collection of sensitive personal information, employment-related data, body-related data, web activity data, location data, and the inability to delete Threads without deleting Instagram.  

The issues are so similar that when we heard Elon Musk is going to sue Meta over Threads, we assume it’s a bid to retain the title of the largest data hoarder cum privacy violator! 

In that case, we know who the winner is! 

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Elon MuskElon Musk sues ThreadsMusk sues MetaTwitter sues Meta threadsTwitter under threatTwitter vs. Threads
Previous Post

Researchers Suspect Multichain Bridge Cryptocurrency Theft Crossed $125M

Next Post

Cybercrime Legislation and International Cooperation: Closing the Enforcement Gap

Next Post
cybercrime legislation

Cybercrime Legislation and International Cooperation: Closing the Enforcement Gap

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Middle East cyberwar
Firewall Daily

Cyber-Kinetic Warfare Escalates as Iran, US, and Israel Clash Across Military and Digital Fronts

March 3, 2026
mandatory cybersecurity requirements
Firewall Daily

Home Routers in Singapore Must Meet Higher Security Standards by 2027

March 3, 2026
UH Cancer Center cyberattack
Firewall Daily

University of Hawaii Cancer Center Breach Exposes SSNs of 87,000+ Participants

March 3, 2026
RESURGE Malware
Cyber News

CISA Warns RESURGE Malware Can Remain Dormant on Ivanti Connect Secure Devices

March 2, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information