Teen’s smart fridge tweets go viral after parents confiscate her phone

Credit: LG

A 15-year-old girl has gone viral on Twitter after posting social updates via her family’s smart fridge, among other devices.

The teenager, known only as Dorothy, had her phone taken away from her after starting a fire whilst cooking, with her mother blaming the blaze on the distraction of social media.

Despite the technology ban, however, Dorothy managed to update her followers about her absence via a number of devices, culminating in an LG Smart Fridge in her home. Dorothy also managed to send out posts via the Image Share option of the Nintendo 3DS and the Nintendo WiiU.

“Thank u [sic] all for the support and love,” said a message, written on a note in the game Minecraft and uploaded via the Nintendo WiiU games console. “I will answer my DMs when I have stable connection to Twitter.”

https://twitter.com/thankunext327/status/1159505376066383872

The Twitter profile is described as a “fan account” in its bio and is primarily dedicated to singer Ariana Grande. Dorothy surpassed 500 followers at the beginning of August but has since topped 28,000 in the wake of her iPhone ban.

The official Twitter account has since called Dorothy “iconic”, with LG’s account joining in tweeting the hashtag “#FreeDorothy”.

In the last few months, Twitter has introduced labels indicating where tweets are being sent from. This distinguishes mobile and app usage of the platform from web usage; it can also be used to show when scheduling tools and social media management platforms are used. Twitter users were informed that Dorothy had tweeted from a fridge by the label under the tweet confirming so.

Dorothy’s mother threatened to delete the account but at the time of writing, Dorothy is still active on Twitter.

Luke Conrad

Technology & Marketing Enthusiast

Six ways to maintain compliance and remain secure

Patrick Spencer VP at Kiteworks • 16th September 2024

With approximately 3.4 billion malicious emails circulating daily, it is crucial for organisations to implement strong safeguards to protect against phishing and business email compromise (BEC) attacks. It is a problem that is not going to go away. In fact, email phishing scams continue to rise, with news of Screwfix customers being targeted breaking at...

Enriching the Edge-Cloud Continuum with eLxr

Jeff Reser • 12th September 2024

At the global Debian conference this summer, the eLxr Project was launched, delivering the first release of a Debian derivative that inherits the intelligent edge capabilities of Debian, with plans to expand these for a streamlined edge-to-cloud deployment approach. eLxr is an open source, enterprise-grade Linux distribution that addresses the unique challenges of near-edge networks...

Embracing digital AI recruitment without rocking the boat

Katherine Loranger • 11th September 2024

Artificial intelligence (AI) is set to become indispensable in business operations. For global enterprises, AI offers significant benefits by simplifying complexity and enabling confident decisions—when used in the right way. Those HR recruitment teams that seamlessly integrate AI technologies will optimise their recruitment practices and will have the opportunity to better realise their commitment to...

Why a data strategy underpins a successful AI strategy

Jim Liddle • 05th September 2024

AI and machine learning offer exciting innovation capabilities for businesses, from next-level predictive analytics to human-like conversational interfaces for functions such as customer service. But despite these tools’ undeniable potential many enterprises today are unprepared to fully leverage AI’s capabilities because they lack a prioritised data strategy. Bringing siloed and far-flung unstructured data repositories into...
The Digital Transformation Expo is coming to London on October 2-3. Register now!