Connect with us

Technology

Here’s some cool stuff you can do with Bluesky

Published

on

Here’s some cool stuff you can do with Bluesky

So, you’ve finally decided to give Bluesky a shot. The social network has come a long way since the early bare-bones days of invite-only signups and recently grew past the 15 million user mark. Along the way, it’s gathered a lot of familiar posting platform features, like direct messages, pinned posts, and the ability to post videos up to 60 seconds in length.

But there’s a lot more to it than that, and I’m not only talking about lore. (Yes, Bluesky has lore, and that’s probably the most classic Twitter thing about it.) It’s also got a number of features and settings you won’t find on X or Threads, like the ability to choose your own algorithm or moderation tools. These serve not just as a fast lane to getting the platform to feel lively but can also create the feeling that you, the user, are in control of your experience.

Here’s a primer on getting up to speed on Bluesky.

Some basics

Bluesky’s Following feed is a simple chronological feed of posts from people you follow. But you can also customize whether it shows replies, reposts, quote posts, and / or samples from your custom feeds — setting all of these to “off” means your Following feed will only display posts from people you follow. You’ll find these options in Settings > Following Feed Preferences.

Advertisement

The platform also lets you decide how you’d like to see reply threads by going to Settings > Thread Preferences. Here, you can sort by oldest, newest, most-liked replies, or have them randomly sorted. (Bluesky also calls this “Poster’s Roulette.”) There’s an option to prioritize people you follow in a reply thread as well as an experimental Threaded Mode option for showing replies as Reddit-like nested threads.

Custom algorithmic feeds

Bluesky’s custom algorithmic feeds are a great way to get started without following anyone at all.
Screenshot: Bluesky

While Bluesky offers two algorithmic feeds to start — “Discover” and “Popular With Friends” — things start to get a lot more fun when you get into custom feeds. Bluesky itself has made some, but most of the custom feeds are user-created.

These feeds are powerful, making it easy to find people who share your interests, see only certain types of content, or sort through your own posts. Want a feed of cat pictures? You got it. Interested in seeing which of your posts has done the best? You’ll want the “My Bangers” feed.

Advertisement

To check out the custom feeds:

  • Tap the three lines icon in the upper left to summon the sidebar.
  • In the sidebar, select Feeds.
  • Search for a feed or scroll through them to pick the ones you like.
  • Click or tap on individual feeds to preview them.
  • To follow a feed from the Feeds page, click on the individual feed, select the three dots in the upper corner, and then select Save to my feeds. It will now appear at the top of your Feeds list.
  • To follow a feed from Bluesky’s homescreen, tap Pin to Home at the top. Now, it will appear as a tab at the top of that screen.

Starter Packs

Oh look, a Verge Starter Pack.
Screenshot: The Verge staff Starter Pack

Another easy way to find Bluesky accounts to follow is Starter Packs. These are prepackaged lists of accounts, often chosen around a theme. Bluesky’s team has made some of these, but there are also thousands of user-made lists containing accounts that often post about specific topics or are part of certain groups. (The Verge even has one; you can find it right here.)

Bluesky hasn’t made Starter Packs searchable yet, so the only way you’ll find them is by searching outside of the platform (I like this directory), spotting them when they’re posted by other users, or having them sent to you. Once you find a Starter Pack you like, just click the Follow all button at the top of the screen to, you know, follow all of them, or select the Follow button by individual accounts if you’re feeling choosy.

And if you want to create your own Starter Pack, it isn’t difficult: Bluesky has directions right here.

Advertisement

Custom domains

I finally figured out what to do with that domain name I bought last year.
Screenshot: Bluesky

Like Mastodon, Bluesky is a federated platform, except it uses AT Protocol instead of ActivityPub. As such, you can pick your own domain name suffix for your handle. You’ll need to either own that domain or get it from another service, such as Threads. A word of warning, though: once you’ve done this, your handle / domain name combo is now free for someone else to take. (Bluesky says that “any tags or mentions with your old handle will still point to your account,” though.)

Use the “Change my handle” feature to switch to a custom domain.
Screenshot: Bluesky

To switch to a custom domain:

  • Select Settings > Change Handle.
  • Choose I have my own domain.
  • Enter your domain, and select Copy Domain Value, which copies the string of text at the end of the record.
  • Navigate to your domain registrar (the company you bought the domain from) and find an option labeled Manage DNS or similar.

Here’s what adding a new record would look like in GoDaddy’s DNS management screen.
Screenshot: GoDaddy DNS management
  • Add a TXT record and enter the record information you gathered from Bluesky. Note: this process differs between domain name providers, so you may need to look up instructions, such as the ones I’ve linked here for popular registrars GoDaddy and Squarespace.
  • Once you’ve saved the record, wait a few minutes, go back to Bluesky, and select Verify DNS Record. A green banner in the Change Handle box will appear to let you know you succeeded.

Pinned posts

Like X and Threads, you can pin posts to the top of your account. Here’s how:

Advertisement
  • Navigate to the post you want to pin.
  • Select the three dots beneath the post.
  • Select Pin to your profile.

Labelers

The Bears still suck.
Screenshot: Bluesky NFL Team Labeler

Bluesky’s moderation is buttressed by Labelers, which are third-party services that can tag accounts or content, either for informational purposes or for moderation. The tags are wide-ranging and can be used to hide things like posts with GIFs, crypto scammer accounts, brand accounts, or phobia triggers.

It goes far beyond that, though. Some use it as a convenient way to display or view pronouns, find fans of their favorite sports teams, and even play text-based games through Labelers like this TTRPG one. Each one differs in its use and usually offers instructions for using it. Also, Bluesky doesn’t currently have a built-in way to find Labelers, but there are lists and tools for that.

To use a Labeler once you’ve found one you like:

  • Navigate to its Bluesky page.
  • Select Subscribe to Labeler.

If it has a list of labels to customize, pick an option for each:
Off: to keep the label off.
Show badge: to see the label when applied to content or accounts.
Hide: to hide content or accounts with that label.

If you decide you want to change those selections later, you can do so by going to Settings > Moderation and selecting the Labeler from the Advanced section.

Advertisement

App Passwords

The App Passwords screen in Bluesky.
Screenshot: Bluesky

Bluesky lets you create passwords for other apps to use. This is helpful if you like to use apps — like third-party client Graysky — that take advantage of the Bluesky API but don’t want to give them your permanent password. Here’s how you can do that.

  • Navigate to Settings > App Passwords (Under Advanced).
  • Select Add App Password.
  • Enter a name for the password or use the one Bluesky generates.
  • If you want to let the app use direct messaging, tick the Allow access to your direct messages box. Note: you can’t change this option later; you can only delete the password and create a new one for that app.
  • Select Create App Password.
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Sony is giving the PS5’s accessories an all-black makeover

Published

on

Sony is giving the PS5’s accessories an all-black makeover

You can finally make your PS5 gaming set up all black everything. Sony has announced that it will soon release the rest of the PS5 suite of accessories in the midnight black colorway.

Sony’s offering the Dual Sense Edge Controller, the Pulse wireless headphones and earbuds, and the PlayStation Portal in sleek and sexy midnight black to match the PS5 cover and Dual Sense controller it released back in 2021.

PlayStation’s website has the details on pricing for the electronics with pre-orders starting on January 16th.

If you’d rather wait, the accessories will hit retailers on February 20th.

Continue Reading

Technology

FBI's new warning about AI-driven scams that are after your cash

Published

on

FBI's new warning about AI-driven scams that are after your cash

The FBI is issuing a warning that criminals are increasingly using generative AI technologies, particularly deepfakes, to exploit unsuspecting individuals. This alert serves as a reminder of the growing sophistication and accessibility of these technologies and the urgent need for vigilance in protecting ourselves from potential scams. Let’s explore what deepfakes are, how they’re being used by criminals and what steps you can take to safeguard your personal information.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

FBI building in D.C. (Kurt “CyberGuy” Knutsson)

The rise of deepfake technology

Deepfakes refer to AI-generated content that can convincingly mimic real people, including their voices, images and videos. Criminals are using these techniques to impersonate individuals, often in crisis situations. For instance, they might generate audio clips that sound like a loved one asking for urgent financial assistance or even create real-time video calls that appear to involve company executives or law enforcement officials. The FBI has identified 17 common techniques used by criminals to create these deceptive materials.

Advertisement
FBI's new warning about AI-driven scams that are after your cash

Image of AI illustration (Kurt “CyberGuy” Knutsson)

THE AI-POWERED GRANDMA TAKING ON SCAMMERS

Key tactics used by criminals

The FBI has identified 17 common techniques that criminals are using to exploit generative AI technologies, particularly deepfakes, for fraudulent activities. Here is a comprehensive list of these techniques.

1) Voice cloning: Generating audio clips that mimic the voice of a family member or other trusted individuals to manipulate victims.

2) Real-time video calls: Creating fake video interactions that appear to involve authority figures, such as law enforcement or corporate executives.

3) Social engineering: Utilizing emotional appeals to manipulate victims into revealing personal information or transferring funds.

Advertisement

4) AI-generated text: Crafting realistic written messages for phishing attacks and social engineering schemes, making them appear credible.

5) AI-generated images: Using synthetic images to create believable profiles on social media or fraudulent websites.

6) AI-generated videos: Producing convincing videos that can be used in scams, including investment frauds or impersonation schemes.

7) Creating fake social media profiles: Establishing fraudulent accounts that use AI-generated content to deceive others.

8) Phishing emails: Sending emails that appear legitimate but are crafted using AI to trick recipients into providing sensitive information.

Advertisement

9) Impersonation of public figures: Using deepfake technology to create videos or audio clips that mimic well-known personalities for scams.

10) Fake identification documents: Generating fraudulent IDs, such as driver’s licenses or credentials, for identity fraud and impersonation.

11) Investment fraud schemes: Deploying AI-generated materials to convince victims to invest in non-existent opportunities.

12) Ransom demands: Impersonating loved ones in distress to solicit ransom payments from victims.

13) Manipulating voice recognition systems: Using cloned voices to bypass security measures that rely on voice authentication.

Advertisement

14) Fake charity appeals: Creating deepfake content that solicits donations under false pretenses, often during crises.

15) Business email compromise: Crafting emails that appear to come from executives or trusted contacts to authorize fraudulent transactions.

16) Creating misinformation campaigns: Utilizing deepfake videos as part of broader disinformation efforts, particularly around significant events like elections.

17) Exploiting crisis situations: Generating urgent requests for help or money during emergencies, leveraging emotional manipulation.

FBI's new warning about AI-driven scams that are after your cash

Image of AI illustration (Kurt “CyberGuy” Knutsson)

These tactics highlight the increasing sophistication of fraud schemes facilitated by generative AI and the importance of vigilance in protecting personal information.

Advertisement

FCC NAMES ITS FIRST-EVER AI SCAMMER IN THREAT ALERT

Tips for protecting yourself from deepfakes

Implementing the following strategies can enhance your security and awareness against deepfake-related fraud.

1) Limit your online presence: Reduce the amount of personal information, especially high-quality images and videos, available on social media by adjusting privacy settings.

2) Invest in personal data removal services: The less information is out there, the harder it is for someone to create a deepfake of you. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3) Avoid sharing sensitive information: Never disclose personal details or financial information to strangers online or over the phone.

Advertisement

4) Stay vigilant with new connections: Be cautious when accepting new friends or connections on social media; verify their authenticity before engaging.

5) Check privacy settings on social media: Ensure that your profiles are set to private and that you only accept friend requests from trusted individuals. Here’s how to switch any social media accounts, including Facebook, Instagram, Twitter and any others you may use, to private.

6) Use two-factor authentication (2FA): Implement 2FA on your accounts to add an extra layer of security against unauthorized access.

7) Verify callers: If you receive a suspicious call, hang up and independently verify the caller’s identity by contacting their organization through official channels.

8) Watermark your media: When sharing photos or videos online, consider using digital watermarks to deter unauthorized use.

Advertisement

9) Monitor your accounts regularly: Keep an eye on your financial and online accounts for any unusual activity that could indicate fraud.

10) Use strong and unique passwords: Employ different passwords for various accounts to prevent a single breach from compromising multiple services. Consider using a password manager to generate and store complex passwords.

11) Regularly backup your data: Maintain backups of important data to protect against ransomware attacks and ensure recovery in case of data loss.

12) Create a secret verification phrase: Establish a unique word or phrase with family and friends to verify identities during unexpected communications.

13) Be aware of visual imperfections: Look for subtle flaws in images or videos, such as distorted features or unnatural movements, which may indicate manipulation.

Advertisement

14) Listen for anomalies in voice: Pay attention to the tone, pitch and choice of words in audio clips. AI-generated voices may sound unnatural or robotic.

15) Don’t click on links or download attachments from suspicious sources: Be cautious when receiving emails, direct messages, texts, phone calls or other digital communications if the source is unknown. This is especially true if the message is demanding that you act fast, such as claiming your computer has been hacked or that you have won a prize. Deepfake creators attempt to manipulate your emotions, so you download malware or share personal information. Always think before you click.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

16) Be cautious with money transfers: Do not send money, gift cards or cryptocurrencies to people you do not know or have met only online or over the phone.

17) Report suspicious activity: If you suspect that you have been targeted by scammers or have fallen victim to a fraud scheme, report it to the FBI’s Internet Crime Complaint Center

Advertisement
FBI's new warning about AI-driven scams that are after your cash

A woman typing on her laptop (Kurt “CyberGuy” Knutsson)

By following these tips, individuals can better protect themselves from the risks associated with deepfake technology and related scams.

30% OF AMERICANS OVER 65 WANT TO BE REMOVED FROM THE WEB. HERE’S WHY

Kurt’s key takeaways

The increasing use of generative AI technologies, particularly deepfakes, by criminals highlights a pressing need for awareness and caution. As the FBI warns, these sophisticated tools enable fraudsters to impersonate individuals convincingly, making scams harder to detect and more believable than ever. It’s crucial for everyone to understand the tactics employed by these criminals and to take proactive steps to protect their personal information. By staying informed about the risks and implementing security measures, such as verifying identities and limiting online exposure, we can better safeguard ourselves against these emerging threats.

In what ways do you think businesses and governments should respond to the growing threat of AI-powered fraud? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Technology

Nvidia is bringing a native GeForce Now app to Steam Deck

Published

on

Nvidia is bringing a native GeForce Now app to Steam Deck

Nvidia plans to release a native GeForce Now app for Steam Deck “later this year,” according to a blog post. It’s already relatively straightforward to get Nvidia’s cloud gaming service set up on Steam Deck thanks to a special script from Nvidia, but a native app should be easier to install and will support up to 4K resolution and 60 fps with HDR when connected to a TV.

Nvidia also plans to bring GeForce Now to some major VR headsets later this month, including the Apple Vision Pro, Meta Quest 3 and 3S, and Pico “virtual- and mixed-reality devices.” When GeForce Now version 2.0.70 is available, people using those headsets will be able to access an “extensive library of games” they can stream by visiting play.geforcenow.com in their browser.

The company also says that two major titles from Microsoft will be available on GeForce Now when they come out this year: Avowed, which launches February 18th, and DOOM: The Dark Ages, which is set to be available sometime this year.

Continue Reading

Trending