Getting verified on social media or a dating app is like receiving a warm hug of trust that’s quite reassuring. Most users feel it helps them feel at ease when chatting with new contacts or friends. But it does raise a pressing question, “How reliable are these account verification systems?”
Platforms like X (formerly Twitter), Meta (which includes Facebook and Instagram), and dating apps like Bumble have set up different verification functions to help keep their users safe from different scammer or catfish accounts. But, despite these good intentions, many users have experienced the frustration of finding one or more scammers that somehow got the “Blue-Check” by tricking the system.
Why These Verifications Are Not Working As They Should
While the existence of verification processes is a move in the right direction, many of them are still quite weak. They’re not exactly fortress-like shields against scammers, who are always busy finding new ways to exploit systems and victims. They create fake profiles and engage in harmful activities like sextortion, online blackmail, and catfishing.
According to the Identity Theft Resource Center (ITRC)(1), there’s a troubling trend of scammers pretending to be account verification experts. This can make vulnerable users feel scammed when they purchase fake services, which can damage their reputations and expose them to even greater risks.
But how do these scammers get past the major account verification systems? Let’s explore three of the most publicized account verification systems and their current weaknesses.
X Blue Check (formerly Twitter)
X Introduced the blue checkmark(2) to assure users that they were interacting with legit accounts, particularly for celebrities and public figures. But then, when they switched to a paid verification model, it became way too easy for anyone to get a blue check.
This change opened the door for scammers to buy blue checks and pretend to be real people or businesses, leading unsuspecting users to trust them. Leveraging this system loophole, scammers have been able to steal personal information, including the banking details of users on the platform.
It’s frustrating to realize that a blue checkmark doesn’t guarantee someone’s true identity. Scammers can cleverly use real accounts to bypass security, carefully creating logos, names, and visuals that look real, making it hard for system administrators and users to spot the fakes.
The Meta Blue Check
Meta’s verification process is stricter than other platforms(3). It requires users to show a valid ID. While, at surface level this seems like a strong safeguard, scammers have found ways to circumvent this measure. Whether by stealing real IDs or creating fake ones there are methods to bypass Meta’s account verification procedures.
The Bumble Blue Shield Marker
Now, let’s talk about Bumble. The dating application implemented their Blue Shield marker program in 2021(4) to verify user profiles. This tool requires users upload a selfie that is then compared to the profile images they submit when creating their profile images. While this method has reduced the number of fake profiles on the platform, it’s been found to be circumventable as well.
Scammers can be super crafty and may utilize photo-editing tools or stolen images to create convincing profiles that pass the selfie check. The blue check verification does not automatically trigger the review of a system administrator, it uses AI to process preliminary checks against the photos submitted and any social profiles added with the profile submission.
Tinder ID Matching
Tinder’s security protocol(5) is a mixture of the Bumble and Meta security checks. It’s a two-step process that requires users to upload an ID like a driver’s license or passport, along with a selfie. This extra layer of security is one of the most effective on dating apps. However, as illustrated in the cases of Bumble and Meta, stolen or generated identification can bypass this security measure.
Some might create authentic-looking fake IDs, while others might edit their photos or play around with the verification process itself. While this system is set up to make it tougher for scammers to succeed, the truth is, that this is a job for these criminals and they do their research.
Alternatives for Avoiding Scammers Online
Scammers are still out there using tactics like impersonation, social engineering, and other fraudulent methods to deceive users. That’s why it’s super important to stay vigilant and not just rely on that shiny verification badge when dealing with accounts online.
On Social Networks
- Check the account age: Accounts that have been around for a while and have a consistent posting history usually tend to be more trustworthy.
- Review their posts: Real accounts interact thoughtfully with others, and their posts often tell a story. If something feels off or lacks detail, it might be a good idea to take a step back.
- User reverse image searches: When you’re not sure, don’t hesitate to do a reverse image search on their photos. You can see if they appear elsewhere online, especially on scam-related websites.
On Dating Apps
- Stay alert for red flags: If someone seems too eager to move the conversation off the app or is overly keen to connect really fast, take a moment to reflect on this. These could be a sign that something isn’t quite right.
- Protect your personal information: Don’t share your home address or send money to someone you haven’t met in person. It’s not worth the risk.
- Trust your instincts: There’s no rush to move the conversation beyond the app until you feel completely comfortable that the other person is who they claim to be. Your intuition is usually spot on, so go ahead, trust it!
Are You a Victim of a Cyber Crime?
If we want to tackle these crimes, we have to work together, and that’s where Digital Forensics Corp. comes into play. We are here to help victims dealing with cybercrimes like online blackmail, cyber harassment, and sextortion.
Our dedicated team uses the latest tools in cybersecurity to uncover the digital footprints that scammers leave behind, including IP addresses and financial records. We leverage this information to track down the root of your issues, ensuring fast removal and mitigation of the harmful content. Your personal information and digital reputation deserve protection, and we can help put a stop digital blackmail.
If you find yourself in this situation, please don’t think twice about reaching out. You can message a team member using our live chat for assistance or feel free to contact our Blackmail Helpline. Our experts are on standby 24/7, ready to lend a hand.
Sources
- https://www.idtheftcenter.org/post/looking-to-get-verified-on-social-media-watch-out-for-scammers/
- https://help.x.com/en/managing-your-account/about-x-verified-accounts
- https://about.meta.com/technologies/meta-verified/
- https://bumble.com/en/the-buzz/verify-bumble-match-profile
- https://policies.tinder.com/web/safety-center/tools/photo-verification/intl/en/
DISCLAIMER: THIS POST IS FOR INFORMATIONAL PURPOSES ONLY AND IS NOT TO BE CONSIDERED LEGAL ADVICE ON ANY SUBJECT MATTER. DIGITAL FORENSICS CORP. IS NOT A LAWFIRM AND DOES NOT PROVIDE LEGAL ADVICE OR SERVICES. By viewing posts, the reader understands there is no attorney-client relationship, the post should not be used as a substitute for legal advice from a licensed professional attorney, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation.