If you notice your chat messages show up in the chat feed but don’t appear on the streamers in-screen chat, you have been shadowbanned.

Twitch will still take your money for donations, subs, etc, but your feedback won’t be seen by anybody but you. This shadowban does not appear in the appeals page and can be applied randomly and intermittently. You are never informed about this by the way. You’ll likely be talking in a chat and assuming you’re being ignored. Hop into a private tab and load up the stream where you’ll be able to notice if your messages are missing in chat.

From my observations, there seems to be some type of algorithm/system that determines who to shadowban. I’m assuming it assigns extra points for factors like VPN usage, Linux, and adblockers. Once you’ve been shadowbanned, switching one of those three will not work to unban you until some arbitrary timer expires.

I’m posting this in case anybody else has experienced this and felt frustrated and isolated. You’re not being ignored (unless you’re a twat and are being ignored). You’re just being punished by Twitch for being privacy conscious.

  • brownmustardminion@lemmy.mlOP
    link
    fedilink
    arrow-up
    20
    arrow-down
    10
    ·
    2 months ago

    It’s trivial for twitch to differentiate between users who are logged in and have verified accounts. Slapping bans by IP is archaic and lazy when you have more precise metrics to go by. And at the very least, they should make you aware that you are banned before accepting your money for their services.

      • brownmustardminion@lemmy.mlOP
        link
        fedilink
        arrow-up
        7
        arrow-down
        3
        ·
        2 months ago

        Think of it from the reverse direction. If you have a twitch account in good standing that’s verified with a valid email and has no violations, why all of the sudden would it make sense to apply a ban to this account? Perhaps preventing new accounts from being created on a sketchy IP could be a sensible solution, but shadowbanning an existing account makes no sense and is a lazy approach to security. In addition, fingerprinting makes it so a service can easily differentiate between users using the same IP.

        • fuckwit_mcbumcrumble@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          1
          ·
          2 months ago

          What if the account is compromised? Now the spammer is able to do their spams freely on the IP address.

          It’s just a hell of a lot easier to black list the entire IP than to try to manually let in small percentage of people who use a VPN AND want to comment or whatever.

          • mox@lemmy.sdf.org
            link
            fedilink
            arrow-up
            7
            ·
            edit-2
            2 months ago

            It’s just a hell of a lot easier to black list the entire IP than to try to manually let in small percentage of people who use a VPN AND want to comment or whatever.

            “It’s okay to punish people who have done nothing wrong as long as they’re a minority group.”

            It’s a lazy approach to filtering/moderation that breaks the service for legitimate users and is not much easier to implement than a per-account reputation system.

            Much like the practice of blacklisting email forwarding domains, I won’t use it in any service I run, except maybe temporarily to mitigate an active DDOS attack.

          • Gnorv@feddit.de
            link
            fedilink
            English
            arrow-up
            6
            ·
            2 months ago

            Of course it is easier, however, the point was that it is lazy…

            • kick_out_the_jams@kbin.social
              link
              fedilink
              arrow-up
              2
              ·
              edit-2
              2 months ago

              I suppose it’s possible to build a system that would let you specifically allow a VPN IP to be green-listed on your account, but you’d probably have to allow it by signing in from a known good IP first.

              I think it seems like lot of work for something that isn’t really private and is still probably vulnerable to exploit.

            • navi@lemmy.tespia.org
              link
              fedilink
              arrow-up
              2
              ·
              2 months ago

              It probably is the the best bang for their buck. I doubt they lose significant profit from the simple stopgaps.

    • brownmustardminion@lemmy.mlOP
      link
      fedilink
      arrow-up
      5
      arrow-down
      5
      ·
      2 months ago

      I’m curious to hear the opinion of those downvoting this response. It seems off brand for privacy enthusiasts to disagree with my take on IP bans.

      • thantik@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        2 months ago

        It’s because many privacy enthusiasts are or have also been in network infrastructure, and realize the measures that must be taken on a hostile network which literally defines the internet.

        I told you what to do. Rent a VPS, and set your own VPN up. Nothing is stopping you from doing this the right way.