NicolasConstant / BirdsiteLive

An ethical bridge from Twitter
GNU Affero General Public License v3.0
457 stars 36 forks source link

Delete created bot account #170

Closed Selduro closed 1 year ago

Selduro commented 1 year ago

Hey,

I've read your thourough explanation on https://write.as/nicolas-constant/closing-the-official-bsl-instance but now I do wonder, if there is any way to delete the created bot account, since I now have an actual account on a mastodon instance using the same handle (because people from twitter know me like that) but the bot and my now real account keep showing up as search results.

regards

NicolasConstant commented 1 year ago

Hi!

You could ask to your instance admin to remove / hide the account since it's a local view (not a mastodon dev nor admin, but I guess it's possible).

srd424 commented 1 year ago

I have a vague feeling there's an activity pub message type to inform of account deletion? If there is and you have the data and keys from your instance it might be possible (obviously rate limited!)

slfhstr commented 1 year ago

You could ask to your instance admin to remove / hide the account since it's a local view (not a mastodon dev nor admin, but I guess it's possible).

Are there instructions for an admin how to delete an account ? Or empty the database and start over ?

slfhstr commented 1 year ago

For others, this is my hack :

  1. connect to the postgres db docker exec -it xxxx bash where xxxx is the container id (find container id by docker ps -a : name is probably postgres:9.6) psql -h localhost -p 5432 -U birdsitelive assuming you are using standard settings

  2. delete from twitter_users where acct LIKE 'xxxx'; where xxxx is the the name of twitter acct to remove other tasks : select count(*) from twitter_users; to show how many on the instance delete * from twitter_users to delete all entries select acct from twitter_users where acct = 'xxxx'; to check for a twitter account in the instance

  3. exit \q to leave psql exit to quit the contrainer

If there is a better way to do this, please share !

NicolasConstant commented 1 year ago

This won't really solve this issue: it only remove the account from the local BSL instance DB (and only until someone re-create the bot by following it).

Currently (0.20.0), blacklisting the bot is the best you can do on your instance (disabling it and blocking recreation of it). But it won't remove remote local copy of it in other instances, so they will always pop-up in search. You can ask your admin to remove those, but that's all you can do.

But I'm working currently on the next update that will solve this, triggering the proper ActivityPub events / states to disable properly a mirroring account. 🙂

slfhstr commented 1 year ago

Thanks for the clarification. But where is the actual bot operating (taking content from twitter and 'posting') ? Isn't it on the individual BSL instance ? And doesn't that use the postgres db to know what twitter accounts ? Is there not a way to stop the bot reposting ? Appreciate the federation means many instances may know of @birdsite.xxx.yyy but if the bot is not posting, then that doesn't matter. Apologies for my ignorance of the process.

NicolasConstant commented 1 year ago

There is currently (0.20.0) three ways to stop the bot posting:

Only the first two prevent the bot to start posting again in all cases: in the third case, anyone following the account again will recreate it and it will start synchronizing data again.

That being said, this is not really the subject of the issue discussed here that is the presence in the search result of disabled BSL accounts and there is currently no way to handle this. And it is important since the biggest issue people have currently with BSL is the search pollution it creates (as it can be misleading for newcomers).

slfhstr commented 1 year ago

Thanks for the clarification and good luck with the next phase.

My instance got polluted with many unwanted entries, too many to blacklist manually. Rightly or wrongly, I deleted them and stuck a http auth on so they can't be recreated (w/o cracking the auth)

NicolasConstant commented 1 year ago

handled in 0.21.0