Meta introduces verification subscriptions

Meta introduces verification subscriptions

Meta has introduced a new subscription service called “Meta Verified.” This service offers verified badges and extra security features. It will roll out gradually, starting with Australia and New Zealand.

Meta’s announcement follows a plan by Twitter CEO Elon Musk. Twitter will offer a similar service called Twitter Blue. This service allows users to pay for a verification check and will eventually prioritize tweets from verified users in comments and searches. Musk also promised to phase out Twitter’s previous verification system, which required users to be notable.

However, Twitter Blue’s rollout became overwhelmed by a wave of imposter accounts. This issue forced the company to temporarily pull the verification feature down.

It was relaunched a few weeks later, with Twitter ultimately preventing users from changing aspects of their profile or face losing their verification checks to stamp out impersonators. Twitter Blue does not require users to submit a government ID to become verified.

New subscribers to Meta Verified will also be unable to change any profile details, like the picture, name and username, “without going through the Meta Verified subscription and verifications application process again.”

SEE ALSO: https://southasiatimes.org/hashtag-wars-and-afghanistan/

Meta said there will be “no changes to accounts on Instagram and Facebook that are already verified based on prior requirements, including authenticity and notability.”

The new service begins launching this week with a gradual test to “learn what’s most valuable” before a global launch.

“We’ll be rolling out in Australia and New Zealand this week” Zuckerberg said, “and more countries soon.”

Source: ABC News

News Desk

Your trusted source for insightful journalism. Stay informed with our compelling coverage of global affairs, business, technology, and more.

Recent

AQAP’s Threat to China: Pathways Through Al-Qaeda’s Global Network

AQAP’s Threat to China: Pathways Through Al-Qaeda’s Global Network

AQAP’s threat against China marks a shift from rhetoric to execution, rooted in Al-Qaeda’s decentralized global architecture. By using Afghanistan as a coordination hub and relying on AQIS, TTP, and Uyghur militants of the Turkistan Islamic Party as local enablers, the threat is designed to be carried out far beyond Yemen. From CPEC projects in Pakistan to Chinese interests in Central Asia and Africa, the networked nature of Al-Qaeda allows a geographically dispersed yet strategically aligned campaign against Beijing.

Read More »
The Enduring Consequences of America’s Exit from Afghanistan

The Enduring Consequences of America’s Exit from Afghanistan

The 2021 US withdrawal from Afghanistan was more than the end of a long war, it was a poorly executed exit that triggered the rapid collapse of the Afghan state. The fall of Kabul, the Abbey Gate attack, and the return of militant groups exposed serious gaps in planning and coordination.

Read More »
The Afghan Crucible

The Afghan Crucible

Recent reporting underscores Afghanistan’s transformation into a strategic hub for transnational jihadist networks. Far from being a localized security problem, the Afghan landscape now functions as an ideological, logistical, and digital anchor linking extremist affiliates across Africa, Southeast Asia, and beyond, signaling the collapse of regional containment and the rise of a globalized threat architecture.

Read More »
Economic Statecraft and the New Geography of Power in Regional Politics

Economic Statecraft and the New Geography of Power in Regional Politics

Strategic competition has moved beyond decisive wars toward a subtler synthesis of economic leverage, proxy networks, and calibrated force. Infrastructure, finance, and trade routes now function as instruments of power, quietly reshaping regional orders while preserving the façade of restraint. In this environment, security is no longer confined to the battlefield but embedded in supply chains, data networks, and development choices, forcing states to rethink deterrence, sovereignty, and resilience.

Read More »
The Manufacturing of a False Equivalence

The Manufacturing of a False Equivalence

As scrutiny mounts over the Taliban’s tolerance of TTP sanctuaries, Kabul has attempted to deflect blame by alleging that ISIS-K operates from Pakistan. This false equivalence ignores the historical origins of ISIS-K in eastern Afghanistan, its sustained campaign of violence against Pakistan, and verified intelligence showing that the group’s operational depth remains rooted inside Afghan territory.

Read More »