Join Nostr
2025-10-23 18:54:00 UTC

IFTAS on Nostr: The community shared vocabulary is a collaboratively maintained set of terms and ...

The community shared vocabulary is a collaboratively maintained set of terms and definitions used by moderators and administrators to ensure clarity, fairness, and consistency in community governance across diverse platforms.

IFTAS and the SW-ISAC use the following labels and definitions to classify actors, behaviour, and content. Click each label to see its definition, guidance, and example community guidance. Labels are sourced from the [Trust & Safety Glossary of Terms](https://dtspartnership.org/wp-content/uploads/2023/07/DTSP_Trust-Safety-Glossary_July-2023.pdf ) from DTSP.

Thanks to our community, these labels and their definitions are also available in:<li><a href="https://github.com/iftas-org/lote/tree/main/dtsp-trust_safety_glossary_of_terms/fr-FR">Français</a></li><li><a href="https://github.com/iftas-org/lote/tree/main/dtsp-trust_safety_glossary_of_terms/pt-BR">Português Brasileiro</a></li><li><a href="https://github.com/iftas-org/lote/tree/main/dtsp-trust_safety_glossary_of_terms/gd-GB">Scots Gaelic</a>&nbsp;(labels only)</li><li><a href="https://crowdin.com/project/dtsp/zh-CN">简体字</a>&nbsp;(<a href="https://crowdin.com/project/dtsp/zh-CN">Simplified Chinese</a>)</li>###



Labels<li><a href="https://about.iftas.org/library/account-takeover/"; data-type="yada_wiki" data-id="3858">account-takeover</a></li><li><a href="https://about.iftas.org/library/advanced-persistent-threat/"; data-type="yada_wiki" data-id="3849">apt</a> (advanced persistent threat)</li><li><a href="https://about.iftas.org/library/astroturfing/"; data-type="yada_wiki" data-id="3861">astroturfing</a></li><li><a href="https://about.iftas.org/library/brigading/"; data-type="yada_wiki" data-id="3864">brigading</a></li><li><a href="https://about.iftas.org/library/catfishing/"; data-type="yada_wiki" data-id="3866">catfishing</a></li><li><a href="https://about.iftas.org/library/content-and-conduct-related-risk/"; data-type="yada_wiki" data-id="3869">content-and-conduct-related-risk</a></li><li><a href="https://about.iftas.org/library/coordinated-inauthentic-behaviour/"; data-type="yada_wiki" data-id="3872">cib</a> (coordinated inauthentic behaviour)</li><li><a href="https://about.iftas.org/library/copyright-infringement/"; data-type="yada_wiki" data-id="3906">copyright-infringement</a></li><li><a href="https://about.iftas.org/library/counterfeit/"; data-type="yada_wiki" data-id="3908">counterfeit</a></li><li><a href="https://about.iftas.org/library/cross-platform-abuse/"; data-type="yada_wiki" data-id="3875">cross-platform-abuse</a></li><li><a href="https://about.iftas.org/library/csam/"; data-type="yada_wiki" data-id="3911">csam</a> (child sexual abuse material)</li><li><a href="https://about.iftas.org/library/csea/"; data-type="yada_wiki" data-id="3878">csea</a> (child sexual exploitation and abuse)</li><li><a href="https://about.iftas.org/library/defamation/"; data-type="yada_wiki" data-id="3913">defamation</a></li><li><a href="https://about.iftas.org/library/dehumanisation/"; data-type="yada_wiki" data-id="3915">dehumanisation</a></li><li><a href="https://about.iftas.org/library/disinformation/"; data-type="yada_wiki" data-id="3918">disinformation</a></li><li><a href="https://about.iftas.org/library/doxxing/"; data-type="yada_wiki" data-id="3881">doxxing</a></li><li><a href="https://about.iftas.org/library/explicit-content/"; data-type="yada_wiki" data-id="3920">explicit-content</a></li><li><a href="https://about.iftas.org/library/farming/"; data-type="yada_wiki" data-id="3883">farming</a></li><li><a href="https://about.iftas.org/library/glorification-of-violence/"; data-type="yada_wiki" data-id="3923">glorification-of-violence</a></li><li><a href="https://about.iftas.org/library/hate-speech/"; data-type="yada_wiki" data-id="3926">hate-speech</a></li><li><a href="https://about.iftas.org/library/impersonation/"; data-type="yada_wiki" data-id="3851">impersonation</a></li><li><a href="https://about.iftas.org/library/incitement/"; data-type="yada_wiki" data-id="3929">incitement</a></li><li><a href="https://about.iftas.org/library/misinformation/"; data-type="yada_wiki" data-id="3931">misinformation</a></li><li><a href="https://about.iftas.org/library/ncii/"; data-type="yada_wiki" data-id="3934">ncii</a> (non-consensual intimate imagery)</li><li><a href="https://about.iftas.org/library/online-harassment/"; data-type="yada_wiki" data-id="3886">online-harassment</a></li><li><a href="https://about.iftas.org/library/phishing/"; data-type="yada_wiki" data-id="3889">phishing</a></li><li><a href="https://about.iftas.org/library/service-abuse/"; data-type="yada_wiki" data-id="3892">service-abuse</a></li><li><a href="https://about.iftas.org/library/sock-puppet/"; data-type="yada_wiki" data-id="3854">sock-puppet</a></li><li><a href="https://about.iftas.org/library/sextortion/"; data-type="yada_wiki" data-id="3895">sextortion</a></li><li><a href="https://about.iftas.org/library/spam/"; data-type="yada_wiki" data-id="3936">spam</a></li><li><a href="https://about.iftas.org/library/synthetic-media/"; data-type="yada_wiki" data-id="3939">synthetic-media</a></li><li><a href="https://about.iftas.org/library/troll/"; data-type="yada_wiki" data-id="3856">troll</a></li><li><a href="https://about.iftas.org/library/tvec/"; data-type="yada_wiki" data-id="3942">tvec</a> (terrorist and violent extremist content)</li><li><a href="http://violent">violent-threat</a></li>;