X (Twitter) Comparison
How Derupt differs from X (Twitter)
Last updated
How Derupt differs from X (Twitter)
Last updated
Monetization allowing users to directly monetize content without permission.
Users have more flexibility and control over where their data is stored.
Transparency in how the platform operates and how content is handled.
Better mechanisms for spam prevention due to financial barriers for interaction.
Greater user control over content, data, and monetization.
High censorship resistance through immutable, on-chain content.
Decentralization ensures no single entity controls the platform.
ASPECT | X (Twitter) | DERUPT |
---|---|---|
Content Monetization
Permission Required
Permission Not Required
Monetization Method
Achieved via ad-rev split based on attention
Achieved via smart contracts, based on consumer sentiment
Content Discovery
Centralized opaque algorithm, encouraging favoritism and censorship by omission of presentation. (biased)
Decentralized transparent chronological algorithm, encouraging equal opportunity of presentation. (unbiased)
User Control
Centralized, handled by the platform, very limited.
Users control attachment storage, including their fallback loadout-URI
Spam/Bot Prevention
AI-driven moderation, no financial barriers.
On-chain fees disincentivize spammers. Economic barrier in place.
Interface Design
Interface lock in, developers can not create full clients. eg No alternative interface available.
Interface agnostic, developers can create full clients. eg Alternative interfaces availability.
Content Storage
Centralized storage, no fall back control
Primary content stored on-chain; attachments in user-controlled Stacks storage, with fallback flexibility.
Immutability
Content can be removed or modified by the platform.
On-chain messages are immutable and URI pointers are permanent. (fallback loadout-uri's ensure resilience in resolution)
Censorship Resistance
Subject to platform favoritism and legal censorship.
On-chain data cannot be removed. Interfaces may mute, but cannot delete content.
Proof of Censorship
No proofs capable, censorship done in secret. No user recourse.
On-chain attestation proves existence of any muted content.