# Grasping the Bluesky Extortion Dilemma: An Increasingly Worrisome Issue in Social Media
Recently, the social media platform Bluesky has become embroiled in a concerning extortion dilemma. This predicament surfaced after the platform revealed its plan to utilize domain name ownership as a tool for authenticating the identities of public figures. Although the intention was to bolster authenticity and minimize impersonation, it unintentionally created an opportunity for scammers to take advantage of the system.
## What Constitutes the Bluesky Extortion Challenge?
Cybersquatting, the act of registering domain names connected to prominent individuals or brands for the purpose of reselling them at exorbitant prices or impersonating them, has long been a bane on the internet. Bluesky’s recent policy alteration has heightened this problem. By enabling users to connect their social media usernames to their domain names—such as allowing an individual with johnnyappleseed.com to use that same name on Bluesky—the platform unintentionally encouraged scammers.
Scammers swiftly capitalized on this chance, registering domain names of well-known figures and then attempting to extort them. For example, Bloomberg columnist Conor Sen shared a communication he received from a scammer who asserted ownership of conorsen.com and threatened that without purchasing the domain, Sen would be unable to verify his identity on Bluesky.
This resulted in a tumultuous scenario where authentic and counterfeit accounts of notable individuals began to collide, generating confusion and eroding the platform’s credibility.
## Bluesky’s Reaction: Incomplete Protective Measures
In response to the escalating extortion dilemma, Bluesky has started to enforce measures designed to mitigate the issue. A significant step is the introduction of username protection. When a user transitions to a custom domain, Bluesky now safeguards their original username, obstructing others from seizing it. For instance, if Johnny initially registered as johnnyappleseed.bsky.social and subsequently switched to johnnyappleseed.com, his original username would remain protected from being appropriated by a scammer.
This initiative is a welcome reassurance for users concerned about losing their established online personas to malicious parties.
## Improvements to User Experience: Mentions Tab and Sorting Options
Beyond tackling the extortion issue, Bluesky has also launched new features aimed at enhancing user experience. A notable advancement is the creation of a dedicated Mentions tab, allowing users to effortlessly monitor interactions without having to wade through the general Notifications tab.
Additionally, users now possess more control over how they view replies to their posts. They can select between linear and threaded views and sort replies based on various criteria, including the most liked, oldest, newest, and even random selections. These updates demonstrate Bluesky’s dedication to improving user engagement and satisfaction.
## The Competitive Arena
As Bluesky continues to expand—recently eclipsing 25 million users—it contends with fierce competition from other social media platforms. Notably, Threads, developed by Meta, has emerged as a formidable competitor in the quest to attract users looking for alternatives to Twitter (now rebranded as X). While Bluesky has made progress in user verification and experience, it remains uncertain how effectively it can manage challenges such as extortion and impersonation in the future.
## Conclusion
The extortion dilemma confronting Bluesky underscores the intricate challenges social media platforms face in balancing user verification and security. While the platform’s recent actions to protect usernames and enhance user experience are positive strides, ongoing attentiveness and adaptation will be essential in sustaining user trust and safety. As the digital landscape shifts, platforms like Bluesky must stay proactive in addressing new threats to ensure a secure and authentic environment for their users.