This document discusses information infiltration on social media through various means such as advertising, recommendation engines, public and private pages and groups, and messages. It emphasizes the need for transparency and restraint in communication behavior to address concerns around amplification, privacy, policy, and law. It also discusses defense strategies against disinformation attacks that manipulate social algorithms to influence collective online behavior and recommends approaches like detecting attack behavior, analyzing account credibility, and fact checking.