Browse Definitions :
Definition

dark post

Contributor(s): Ivy Wigmore

A dark post is an inexpensive sponsored message on a social media website that is not published to the sponsor page timeline and will not display in follower feeds organically. Although dark posts are clearly labeled sponsored, they often appear in contextual formats that make them blend in with organic posts.

The process of buying and placing sponsored messages on social media websites is keyword-driven and relatively inexpensive when compared to other advertising channels. Dark posts, also known as unpublished posts, allow marketers to programmatically target specific demographics and conduct A/B tests without cluttering up their own brand's newsfeed. Platforms that support unpublished posts include Facebook, LinkedIn, Twitter and Pinterest.

Dark posts have become controversial for a number of reasons, including the form's inherent lack of transparency and their alleged use in the distribution of fake news. To combat the abuse of dark posts, Facebook is changing its policy to make it possible for anyone to see which page is paying for a particular ad and what other ads the advertiser is currently running on Facebook. Twitter has announced it is not changing policy, but emphasizes that all sponsored Tweets will continue to be clearly identified as such.

This was last updated in September 2017

Continue Reading About dark post

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close