X (Twitter) Comparison

How Derupt differs from X (Twitter)

Summary of advantages of Derupt over X:

  • Monetization allowing users to directly monetize content without permission.

  • Users have more flexibility and control over where their data is stored.

  • Transparency in how the platform operates and how content is handled.

  • Better mechanisms for spam prevention due to financial barriers for interaction.

  • Greater user control over content, data, and monetization.

  • High censorship resistance through immutable, on-chain content.

  • Decentralization ensures no single entity controls the platform.

ASPECT
X (Twitter)
DERUPT

Content Monetization

Permission Required

Permission Not Required

Monetization Method

Achieved via ad-rev split based on attention

Achieved via smart contracts, based on consumer sentiment

Content Discovery

Centralized opaque algorithm, encouraging favoritism and censorship by omission of presentation. (biased)

Decentralized transparent chronological algorithm, encouraging equal opportunity of presentation. (unbiased)

User Control

Centralized, handled by the platform, very limited.

Users control attachment storage, including their fallback loadout-URI

Spam/Bot Prevention

AI-driven moderation, no financial barriers.

On-chain fees disincentivize spammers. Economic barrier in place.

Interface Design

Interface lock in, developers can not create full clients. eg No alternative interface available.

Interface agnostic, developers can create full clients. eg Alternative interfaces availability.

Content Storage

Centralized storage, no fall back control

Primary content stored on-chain; attachments in user-controlled Stacks storage, with fallback flexibility.

Immutability

Content can be removed or modified by the platform.

On-chain messages are immutable and URI pointers are permanent. (fallback loadout-uri's ensure resilience in resolution)

Censorship Resistance

Subject to platform favoritism and legal censorship.

On-chain data cannot be removed. Interfaces may mute, but cannot delete content.

Proof of Censorship

No proofs capable, censorship done in secret. No user recourse.

On-chain attestation proves existence of any muted content.

Last updated