A Minute from the Moderators
How can you use mental health to protect yourself online?
Boundaries
Boundaries are a mental health tool for understanding your personal limits. If you feel like you are reaching your personal limits with regularity these days, you likely already know how important it is to not only have healthy boundaries but also have healthy ways of enforcing them.
To show by example, you may want to come online for cat pics and catharsis, but not see food if you’re struggling with an eating disorder - no matter how cute the cat eating their nom noms is. To handle this, you need mental bandwidth and experience actively nurturing yourself. This starts to get into topics that will exceed the scope of this post, but understanding if, when, how, and to what degree you are in control of meeting your own wants and needs is critical to our journeys in life. Mental health work gives us the tools and creativity for solutions like: “I will store a cache of my favorite, trigger-free, cat pics for when I’m just not well enough to be online.”
Why boundaries are important
Calm minds have a greater ability to respond to stressful situations. When we are pressured, we’re likely to make mistakes that cost us. Maybe we say that hurtful thing we didn’t mean, and maybe we click on links instead of typing them, missing homoglyph[1.1] attacks.
It is very common to create a sense of urgency when trying scam[1.2], as the scam relies on impaired judgement to work. The short version is that hijacking the amygdala[1.3], the portion of the brain involved in fight / flight / freeze / fawn, puts a person in a situation where they’re not primarily rationally making decisions, they’re doing so while in a heightened state of stress or other intense emotion.
Understanding this vulnerability is the first step toward protecting ourselves. When we recognize how stress impairs our judgment, we can begin to establish boundaries that help us maintain clarity even under pressure. Boundaries aren’t just about spam and scams, they’re also about recognizing and honoring our limits whether faced with malicious actors or emotionally triggering content.
Learning from prior experiences
Knowing our personal boundaries helps us navigate challenges. For the previous example: can you go online for what you want to accomplish without getting overwhelmed by triggering content? Take time to figure out if you’ll benefit more from engaging or if the stressful exposure will trigger your trauma, and what you can do to support yourself in trauma.
If you choose to engage, remember to prioritize your well being and practice avoiding self-judgement. You do not need to justify taking care of yourself or others. Filtering your feed, blocking sources, taking time before responding, or disengaging completely are all valid choices that need no explanation.
It might not be directly obvious why this is the starting point for talking about spam waves. Health boundaries matter most during a crisis, and we best practice them when we’re not in them (or not in a specific one). Spam waves are a type of boundary violation, where people want you to see or otherwise engage with content without your consent. You will likely also be asked to disclose personal information, click unfamiliar links, or engage in an unfamiliar process.
When we’re struggling to stay grounded, we might react the moment we see content like this. But what if we took a moment and looked again, with a refreshed perspective?
Grounding
Grounding[1.4] and emotional regulation start with recognizing when you’re having a stress response. Notice your heart rate rising? A pit in your stomach? Tight shoulders? Feeling a sudden wave of irritation or panic? Sit with that feeling and make note of it, so you can recognize it once more in the future when it reoccurs. Recognizing when this happens gives you the power to choose your next move deliberately instead of letting urgency push you into an uncontrolled reaction.
This matters because it helps you respond thoughtfully rather than impulsively. That urgent “Click Now” message in your inbox? Click Later. Phone calls, DMs, and so forth? Take small pauses to give you time to ground yourself, both mentally and physically. When you take time for yourself, you are better equipped to think clearly.
First steps for grounding and regulation for online safety
Boundaries around information are protective
There is a lot of common advice around the various types of scams that have become increasingly common for the past couple of decades. A lot of countermeasures for scams rely on teams working together to be effective by establishing trust and sharing information. For individuals, we read about how to recognize phishing links, not to click them, and not to give “certain information” to others.
“Certain information” is in quotes because groups, organizations, and so forth need to say what that “certain information” is, and put boundaries on it. This is why it is common for banks to put out statements like “we will never ask for your social security number or banking information over the phone or via email”. In this pattern, they tell you what “certain information” 1 ) that they will not ask for and 2 ) that is valuable to an attacker, so they probably will ask for it.
Since life is messy, it’s not often that there’s an easy button to press. Scamming is no different. There is often nuance in statements like the above, for example a bank may create boundaries around the conditions where they will ask for certain information. For example, if you call them they may ask for information for you to verify who you are, and if you receive the call, there should be information that you can use to verify the caller.
How does this apply to mental health?
Knowing what information to share is a type of boundary, no different than knowing your personal limits around when to take breaks and set other forms of limits. You need to decide for yourself what personal information you’re comfortable sharing, with whom, and when. Where you are able, deciding in advance helps you know how to navigate as a planned situation unfolds. It also helps you practice for unplanned situations, where you will need to determine this in the moment.
Bypass the request
I’ll admit (me, not Hachyderm), that sometimes rather than verify “real or not” for phone calls, I’ll just ask for a ticket number or similar that I can use, hang up, and then call whatever organization (e.g. bank) through an official phone number and route back in. This trade off in time massively reduces my own cognitive load, and reduces my personal risk when answering an unplanned phone call. Similar can be true of other forms of contact including email and social media.
Another form of “bypassing the request” can be to allow requests to remind you to take action in a way that you are comfortable with.
For example, as various crises escalate simultaneously, there are various individual and regional aid campaigns. If you see these requests, or even are directly tagged by them, you might feel overwhelmed trying to figure out which requests are for bots, other scams, or real people. Instead of trying to verify every request, consider this: if the cause resonates with you, support it through existing channels you already trust or seek out an official channel.
Seeing online fundraisers for a particular issue? You can choose to donate to a local organization or individual doing similar work that you know and feel comfortable with. You’re still giving your help to those who need it, just in a way that leaves you feeling peaceful instead of uncertain.
How does this apply to mental health?
Building skills to allow you to reduce your mental burdens and protect your emotional states are both critical to maintaining your wellbeing. Many of us don’t have unlimited spoons to do detective work, so using our energy and creativity to focus on how we can help ourselves is exactly the type of work we should be doing, and that is what this strategy focuses on.
Hachyderm commitments
Moderation communication
Part of the work that we as instance moderators need to do in light of various online scams is communicate to you what we will and will not ask for, and how we will or will not ask for it. This mirrors other industries that have also done education and awareness about what information they will and will not ask for and in what way e.g., “we will never ask for your account information via email”.
For Hachyderm moderation communications:
- Hachyderm doesn’t request or require anyone to click links for handling accounts.
- Hachyderm works to avoid urgency in moderation communications.
For the latter, while it is true that we can and have sent out time bounded requests, we have worked to ensure that the timeframes in those requests don’t create a sense of urgency or pressure someone to act against their best interests. We also try our best to remind people that moderation decisions are not permanent, and can frequently be reversed with appeals. Over the course of the next month, we will create documentation around what we will communicate and include it in our docs.
If you receive a request from the Hachyderm moderation team, you absolutely can verify the request either by DMing our main account (@hachyderm@hachyderm.io) or emailing us (admin@hachyderm.io). If it helps, a common pattern would be to verify a request through a different communication method than the one you were contacted from. For example, if you receive a DM from an account that looks like a moderation account, email the support address and vice versa. To practice avoiding copy-pasting any potential phishing links or other codes from the message you received, make sure you have either separately stored the relevant links or only copy-paste from official documentation if it is present. (Hachyderm’s contact information is on our About page and Docs.)
Scams vs legitimate campaigns
We also do our best to keep track of various campaigns and differentiate “real or scam”, to the degree that we are able. For campaigns that are identified as scams, we do our best to research and prevent that traffic from coming to Hachyderm. There are few well known campaigns, including but not limited to: impersonation scams to moderation / staff accounts, Jimmy Truth with other name iterations, and various automated scam campaigns[1.5]. A few of you have also done a wonderful job assisting us in research and detection for a few active campaigns, without being asked. Thank you so much for contributing to community safety! For those who are interested in helping out like this, even if you don’t have time to be a moderator, we always make time to help people submit reports of this nature without increasing risk to themselves or others on the platform.
A legitimate campaign
We also recognize that there are legitimate campaigns. One relatively new effort is the Gaza Verified project. I (Quintessence) spoke to Aral to ask questions and generally understand the process, and am comfortable confirming that 1 ) Aral is a real person who is doing the work he states and 2 ) that the people that are being listed on Gaza Verified are confirmed with in-person verification with the network that he and Joy are building. To be overclear: the work is being done, and being done the way it is being communicated.
In-person verification is slow work, as it requires each new contact to be verified by an existing contact. They also take the time to attempt to onboard people who mostly are unfamiliar with the technology we take for granted, and therefore both do not have prior exposure to cultural norms and also due to suffering, do not have a lot of mental bandwidth to “just learn it”.
How to help crisis groups
Whenever you see a group working to help people in crisis, whether it’s this one or others you already know, remember:
- Always ask the group how you can help, instead of showing up with answers first.
- Always make sure to quickly include what skills you have, so they can easily map them to areas you can help.
- Everyone can help people in crisis, it’s just a matter of the how.
“Everyone can help” doesn’t necessarily mean that everyone does a specific task or that everyone has one specific, trained skillset. Help is also approaching situations with empathy and care. As is remembering that you can choose your responses, by practicing good mental health hygiene. For example: recognizing when a new group of people 1 ) isn’t respecting established cultural norms and 2 ) having the awareness to recognize that there might not be a course or a doc ensuring that they do, means that you can choose how you want to move forward. You can choose to attempt to use shame[1.6][1.7] and harm others for not knowing what you know. You could choose to protect your own boundaries non-interactively, by muting or blocking until the situation resolves. And still further you could choose to actively help, by reaching out to the individual or group and offering what you know and why it’s important.
I realize I am being very verbose in that last example, but I do want to be clear: the rise of various global crises have caused many of us to lash out (“shoot first and ask questions later”) towards each other. Some of this is learned, having to scream on the Twitter-that-was to get your airline ticket refunded when the support email doesn’t work or having to submit your full address to sales just to ask a question about a product you don’t own but would like to know about without being followed forever, has caused us to internalize a lot of harmful patterns. I won’t continue to go into this here, as I will be expanding on it in the next Moderator Minutes, but it is important to start the conversation.
Question for Hachydermians
As an experiment, I’d like to end this post with an open question to the community:
What strategies have you found useful, that you’d like to share, to reduce your stress online?
To help make it easier to participate, we’ve made a Github Issue to serve as a discussion thread.
Resources
In-post
[1.1] Wikipedia article about what homoglyphs are
[1.2] How Fraudsters Build Scams and Use Urgency to Trick You
[1.3] Wikipedia article on Amygdala Hijacking
[1.4] VeryWell Mind: Grounding
[1.5] IFTAS Spam Fediverse Services (published 25 Oct 2025)
[1.6] Shame vs Learning
[1.7] Where Does the South End and Christianity Begin? Understanding the role of shame/honor culture in the roots of Christian rage. (Web Archive link due to soft paywall.)
General information about phishing and online scams
[2.1] https://department.va.gov/privacy/fact-sheet/the-four-ps-of-spotting-fraud/
[2.2] https://www.cloudflare.com/learning/access-management/phishing-attack/
[2.3] https://www.usmetrobank.com/wp-content/uploads/2023/06/Phishing-Fundamental-Warning-Signs.pdf
[2.4] https://consumer.ftc.gov/articles/how-recognize-avoid-phishing-scams
[2.5] https://www.verywellmind.com/9-common-scams-to-watch-out-for-8703530