Tech
Twitter’s global market share grows by 55% in 2022 while Facebook loses 12%
Twitter (NYSE: TWTR) and Facebook (NASDAQ: FB) rank as the pioneer social media platforms accounting for billions of users globally, with the two companies competing to be the ultimate leader in the space. However, in recent months, both platforms have recorded a fluctuation in the market share, with Twitter appearing to have the upper hand from a growth perspective amid ongoing internal administrative changes.
In particular, data compiled and calculated by Finbold on November 8 indicates that Twitter’s market share has surged by 55.86% in 2022. On the other hand, Facebook’s share plunged by 11.86% between January and November 2022. The market share value accounts for desktop and mobile devices worldwide.
A breakdown of the market share indicates that Facebook began the year at 76.85%, the platform’s highest share in 2022, while in November, the value stood at 67.73%. Elsewhere, in January, Twitter had a market share of 7.16%, while as of November, the figure stood at 11.16%.
Twitter hits new levels under Elon Musk
From the data, Facebook remains the dominant social media platform, but Twitter is winning the race to expand its market share. Twitter’s share has spiked in correlation with the company’s acquisition by Tesla (NASDAQ: TSLA) CEO Elon Musk, who has already begun implementing several changes at the company.
Interestingly, internal reports, also confirmed by Elon Musk, indicate that Twitter’s daily user growth attained an all-time high during the first full week of Musk’s tenure. The performance appears to quell initial fears that Twitter might experience a mass exodus of users with Musk’s takeover.
Based on the market share data across the year, it can be assumed that Musk has influenced the numbers; for instance, the share spiked around May when the deal was first announced but appeared to plunge after he initially backed out.
In general, the growing market share is a welcomed development considering that a recent report signaled challenging times for Twitter for losing its most active users. Notably, this factor was among the critical areas of focus for Musk after taking over. In this case, the Tesla boss has proposed changes to the Twitter Blue subscription feature. Under the changes, Twitter has rolled out an option to purchase “verified” blue badge for $7.99 a month to incentivize people to interact more.
However, Musk’s initial involvement with Twitter has come with objections from some quarters and will test the company’s ability to sustain its market share. For instance, employees had objected to the deal even as Musk initiated layoffs in his first week. At the same time, Musk’s stand on free speech on the platform has been questioned, a factor likely to affect both users and advertisers.
Impact of Twitter design changes
Besides the Musk factor and promises to make a change, Twitter’s growth can also be attributed to elements like changing the design. Although the company received criticisms for changing its appearance, the move to have the horizontal navigation menu shift from the top of the screen to the left-hand panel has appeared successful.
Interestingly, Twitter has previously been scrutinized for attempting to emulate Facebook, especially with the rollout of its stories-like Fleets. However, Twitter resorted to shutting down the feature due to a lack of user interest.
At the same time, Twitter’s content diversity appears to appeal to most users. Notably, the platform supports cryptocurrencies alongside enabling “not safe for work” (NSFW) such as nudity and pornography.
Facebook’s dwindling market share
At the same time, Facebook’s market share has been affected by the growing competition with newer social media platforms like TikTok. In this line, the company is losing both users and advertising revenue to rivals like TikTok.
Market experts have also accused Facebook of attempting to push users from the platform. Notably, the platform is enticing users from the traditional news feed to reels, a factor that can also hurt its revenues.
Overall, Facebook has struggled with users over the years, with experts pointing to factors like information overload, privacy concerns, addiction, peer pressure, and the emergence of new platforms. Facebook’s dominant focus on promoting the metaverse has yet to yield results despite the aggressive push by CEO Mark Zuckerberg.
Finally, Facebook and Twitter’s ability to sustain and grow their market share will depend heavily on how the platforms intend to attract new users amid the rising competition. For example, the competing platforms offer similar features to Facebook, giving users alternatives.
Twitter has managed to stand out, considering that there is no solid option for the Musk-led company. Notably, Twitter has dominated as a uniquely influential site that is fast-moving, text-heavy, conversational, and news-oriented.
The post Twitter’s global market share grows by 55% in 2022 while Facebook loses 12% appeared first on Finbold.
Tech
Succinct launches Zcam to verify photos with applied cryptography on the iPhone
Cryptographic infrastructure firm Succinct introduced Zcam this Thursday, April 24, 2026, an iPhone camera application designed to combat misinformation. The tool utilizes applied cryptography to digitally sign photos and videos at the precise moment of capture. According to the company’s official announcement, this process creates a tamper-proof record that directly links the media file to the specific hardware of the mobile device through mathematical proofs.
The technical operation of Zcam is based on processing raw image data. The application generates a hash of the information and signs it using cryptographic keys stored within Apple’s Secure Enclave, a hardware-based security module. This method ensures that the sender’s identity and the content’s integrity remain linked, making it difficult to create synthetic content that attempts to impersonate physical reality through external software or post-production processes.
The validity of these captures is supported by the Coalition for Content Provenance and Authenticity standard. This technical framework allows publishers and end consumers to track the origin and edits of any digital piece. By integrating signed provenance metadata, the C2PA standard facilitates a clear visualization of how content was created and which tools were used during the original capture process, effectively removing any ambiguity regarding authorship.
The paradigm shift from detection toward provenance
In the current digital security landscape, the industry faces an unprecedented sophistication in automated threats. Until now, the primary defense against manipulated content focused on post-mortem detection tools that analyze pixels for anomalies. The launch of Zcam proposes a structural change: authenticating reality at the source instead of detecting lies after the content has been published on social networks or traditional media outlets.
From a market perspective, this transition is a direct response to rising threats that already compromise critical security processes. Reports from CertiK indicate that social engineering attacks assisted by synthetic media will be responsible for a large portion of financial hacks in 2026. The ability to generate fake identities has allowed new systems to breach KYC systems with an efficacy that traditional biometric verification methods can no longer contain alone in corporate environments.
The impact of this technology transcends simple personal photo capture. Industry analysts point out that cryptographic provenance could redefine sectors such as war journalism, insurance claims, and institutional identity verification. By moving blockchain technology toward mass-market hardware, Succinct seeks to establish a standard where trust does not depend on human interpretation but on mathematical proofs generated by the phone’s own silicon milliseconds after the shutter fires.
Unlike traditional software solutions, the use of the Secure Enclave introduces a layer of physical security that is difficult to emulate. However, Succinct has been transparent regarding the current limitations of its initial implementation. The company acknowledged that its software development kit has not yet been audited externally and is not considered ready for critical production environments. Cybersecurity history shows that even secure enclaves have suffered vulnerabilities, keeping media sealing as an active research area.
Integrating these tools into users’ daily workflows requires a scalable and automated verification infrastructure. Analytics firms are already working on on-chain investigations to process massive volumes of verified data, suggesting that multimedia file validation will trend toward technical autonomy. The ultimate goal is to reduce reliance on human intermediaries in the validation of digital truth within decentralized ecosystems.
The development of Zcam represents an initial step toward the mass adoption of provenance tools on mobile devices. In the coming months, Succinct is expected to release updates on the interoperability of its signatures with other social media platforms and browsers. The success of this initiative will depend on the industry’s ability to standardize cryptographic verification across all smartphone models available in the global market during the current technological cycle.
This article is for informational purposes and does not constitute financial advice.
The post Succinct launches Zcam to verify photos with applied cryptography on the iPhone appeared first on The Cryptocurrency Post.
Crypto
China Already Has the Compute to Train Mythos-Level AI, Says Nvidia CEO
Nvidia CEO Jensen Huang has warned that China already has the infrastructure and computing power needed to train advanced AI models comparable to Anthropic’s Claude Mythos, raising concerns about potential cybersecurity risks.
Speaking on the Dwarkesh Patel podcast, Huang said the level of compute used to train Mythos is not particularly rare and is already widely available in China.
China’s AI Infrastructure Is “Abundant”
Huang emphasized that the type of hardware and capacity required to build a model like Mythos is not out of reach for China.
“The amount of capacity and the type of compute it was trained on is abundantly available in China,” he said, adding that the country already has access to the necessary chips and infrastructure.
He pointed out that China has significant unused data center capacity, describing it as having “enormous” compute resources, including fully powered but underutilized facilities.
According to Huang, China’s broader advantages include producing around 60% of the world’s mainstream chips, having a large share of global AI researchers, and access to substantial energy resources.
Rising Concerns Over AI and Cybersecurity
The warning comes amid growing concerns about the capabilities of Anthropic’s Claude Mythos model.
The AI system has demonstrated the ability to identify thousands of software vulnerabilities across major operating systems and browsers. Reports suggest that a large portion of these vulnerabilities remain unpatched, increasing the risk of exploitation.
Security researchers have also found that the model can autonomously execute complex, multi-step cyberattacks, tasks that would typically take human experts days to complete.
If a similar model were developed and misused, it could pose serious risks to global cybersecurity, particularly for institutions relying on outdated systems.
Call for Cooperation Over Confrontation
Despite the concerns, Huang cautioned against treating China purely as an adversary.
While acknowledging geopolitical tensions, he argued that collaboration and dialogue around AI development may be a more effective approach to managing risks.
“We want the United States to win,” Huang said, “but having research dialogue is probably the safest path forward.”
US Officials Highlight AI Competition
Meanwhile, US Treasury Secretary Scott Bessent recently described Claude Mythos as a major leap forward in AI capabilities, suggesting it strengthens the US position in the global AI race.
However, the rapid pace of development on both sides underscores the competitive and high-stakes nature of the sector.
Growing Evidence of AI Misuse
Concerns about misuse are not purely theoretical. Anthropic previously reported that a China-linked group attempted to exploit its AI coding tools to target dozens of global organizations, succeeding in some cases.
As AI systems become more powerful and accessible, experts warn that the line between innovation and risk is becoming increasingly thin.
Tech
New AI cybercrime tool breaches banking KYC systems using advanced deepfake technology
According to data published by Dark Web Informer, the actor Jinkusu is marketing an AI cybercrime tool capable of compromising security in 200,000 fraud cases via deepfakes. This fraudulent kit allows bypassing identity verification protocols on financial platforms, marking a critical turning point in protecting today’s global digital assets efficiently.
The system employs cutting-edge technology to perform real-time face swaps with alarming precision and speed. By integrating tools such as InsightFace, attackers achieve fluid gesture transfers that effectively deceive traditional biometrics in real-time. Since these methods evolve rapidly, trust in remote identification processes is currently under an unprecedented technical threat within the global financial infrastructure.
Jinkusu’s sophistication redefines global synthetic identity fraud
Unlike conventional impersonation methods, Jinkusu utilizes sophisticated voice modulation algorithms to personify legitimate users. This capability allows cybercriminals to bypass auditory security layers in banking institutions, generating a structural vulnerability in modern financial systems today. Despite regulatory efforts, the accessibility of these tools democratizes organized crime on a massive and dangerous scale.
Deddy Lavid, an executive at a leading platform in the blockchain sector, warns about the ecosystem’s systemic shortcomings. The expert points out that artificial intelligence drastically lowers barriers to synthetic identity fraud, making the platforms’ front doors a critical failure point. Therefore, it is imperative to adopt a layered security approach that combines verification with proactive monitoring.
Technical analysis performed by Vecert Analyzer reveals a worrying tactical transition compared to previous cycles. While 2022 attacks focused on basic phishing, in 2026 we observe a complete automation of social engineering through deep neural networks globally. This metamorphosis of the attack vector suggests that static defense methods have become obsolete against these dynamic adversaries.
How does artificial intelligence alter the current cryptographic security landscape?
Investors faced historical losses worth 5.5 billion dollars during the last fiscal year alone. These data, linked to psychological manipulation schemes, demonstrate the lethal effectiveness of combining social engineering and technology advanced artificial. Since the software does not require deep technical knowledge, the volume of potential attacks could scale exponentially during the current financial economic cycle.
The same actor, Jinkusu, has been previously linked to the launch of the dangerous Starkiller phishing kit. This malware uses a headless Chrome browser inside a Docker container, allowing to intercept credentials through a real-time reverse proxy invisibly. Although total losses from traditional attacks recently decreased, AI cybercrime keeps the alert level at maximum throughout the global markets.
The evolution of these AI cybercrime tools suggests that visual validation no longer guarantees authenticity. The use of reverse proxies and automated browsers allows attackers to replicate legitimate sessions with fidelity that current firewalls cannot detect. However, cybersecurity companies are already working on AI-based anomaly detection models to counter this growing criminal trend.
The future of security in the cryptographic environment will depend exclusively on the integration of autonomous defenses. Platforms must implement systems that not only verify the static image but also analyze behavioral patterns and network metadata suspiciously and continuously. Proactive surveillance and the constant updating of biometric detection engines will be the pillars of digital resistance moving forward.
The post New AI cybercrime tool breaches banking KYC systems using advanced deepfake technology appeared first on The Cryptocurrency Post.
-
Crypto4 years agoCardalonia Aiming To Become The Biggest Metaverse Project On Cardano
-
Press Release5 years agoP2P2C BREAKTHROUGH CREATES A CONNECTION BETWEEN ETM TOKEN AND THE SUPER PROFITABLE MARKET
-
Blockchain6 years agoWOM Protocol partners with CoinPayments, the world’s largest cryptocurrency payments processor
-
Press Release5 years agoETHERSMART DEVELOPER’S VISION MADE FINTECH COMPANY BECOME DUBAI’S TOP DIGITAL BANK
-
Press Release5 years agoProject Quantum – Decentralised AAA Gaming
-
Blockchain6 years agoWOM Protocol Recommended by Premier Crypto Analyst as only full featured project for August
-
Press Release5 years agoETHERSMART DEVELOPER’S VISION MADE FINTECH COMPANY BECOME DUBAI’S TOP DIGITAL BANK
-
Blockchain6 years ago1.5 Times More Bitcoin is purchased by Grayscale Than Daily Mined Coins
