I have no idea. But I do think we need more tools to handle coordinated inauthentic behavior.

Reply to this note

Please Login to reply.

Discussion

No replies yet.