X builds an auto-lock for any profile posting about crypto for the first time. The system requires phone or email proof before the post goes live. Large accounts that suddenly switch to tokens face the hardest checks. Ownership must be verified before a post reaches the timeline. Scammers are hitting a wall.
- X implements an auto-lock and verification system for any profile posting about cryptocurrency for the first time in account history.
- Chainalysis tracked billions in 2025 losses as scammers used dormant accounts to pump tokens to a $300,000 market cap in minutes.
- Nikita Bier claims the ID wall kills the profit motive by adding friction to the factory-line execution of memecoin rug pulls.
Bier Axed the Scam Payday
Nikita Bier, X head of product, shared the lock plan Wednesday. He focused on profiles with zero crypto history. Bier noted, “We are in the process of implementing auto-locking + verification if a user posts about cryptocurrency for the first time in the history of their account.” He estimated the added friction killed the money-making logic for these crews. Bier blamed external failures for the surge. “This should kill 99% of the incentive, especially since Google isn’t doing shit to stop the phishing emails,” he wrote.
Scammers grabbed logins using fake copyright alerts. They picked old accounts with recognizable names. Scammers used the names to sell junk on Pump.Fun. They pumped the chart using the account’s history and vanished. Buyers were left with nothing. The numbers are wild right now.
One reporter lost an account in 2025. The thief pushed a fake token. The coin hit a $300,000 cap in minutes. The scammer took $10,000 in profit. The loot reached Binance via fast laundering. Chainalysis staff noted that eyes moved charts better than dark wallets.
Dormant Accounts Weaponized
Hackers treated quiet accounts as tools. Dead profiles had no behavioral red flags. They stayed quiet for years. Owners rarely noticed a login before the rug finished. Chainalysis tracked billions in losses during 2025. Memecoin junk drained the sector. Scammers used these profiles to bypass automated filters.
Genuine News Deserves Honest Attention.
High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.
👉 Submit Your PRID Wall Broke the Assembly Line
The ID gate allowed the phish to occur but broke the take. Verification forced a stop right as the thief needed to move. X aimed to make a stolen name less useful for a pump. Credibility was the target.
Bier focused on the payday. The plan hit the profit rather than the code. Big hackers likely moved to recovery mail hacks. The risk stayed but the cost went up. Adding friction served as a specific step against the trend. The factory line for rugs stopped at the gate.
Chain Street’s Take
Account hackers want the name, not just the coins. They steal trust to move a chart. The lock won’t stop every rug. It breaks the factory line. Focusing on the cash out is the right math. The move from a stolen name to cash is the only point that matters. The era of the free launchpad is over.
X is hitting the bottleneck. Scammers need followers for a pump. Stealing a dead account was the cheap path. The fix makes it expensive. This feels different than past security theater. X is finally squeezing the cash-out point.
Activate Intelligence Layer
Institutional-grade structural analysis for this article.





