Now that TweetAttacks and some of the other big players have been slapped with lawsuits, let's commiserate about how we really used that kind of software. Hopefully this will showcase how the majority of users actually only used the software for white hat purposes, or at least give future coders a nice case study of what people want most in (hopefully) future alternatives. I, for one, used TA mainly to follow/unfollow and schedule tweets. My followers were real and were targeted for the particular niche in which I was working. Seeing as how these tasks are simply manipulation of normal web browsing activities, I consider this to be quite white hat. What gets black hat is the @mentions and wait and reply modules (I always steered away from these modules because my goal was to consistently increase followers and engage them with content they would actually appreciate without risking those accounts. No use in building thousands of followers only to have the account banned later.) What about the rest of us? Were your purposes aimed more at legitimate manipulation of twitter-related web browsing? Were you more active with the spam-heavy/black hat modules and techniques? Perhaps, if you're not too apprehensive about sharing, you can recommend alternative methods to achieve the same goals without having to spend hours in front of the monitor doing all those tasks manually.