Anonymously
   HOME

TheInfoList



OR:

Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques. An important example for anonymity being not only protected, but enforced by law is the vote in
free elections An election is a formal group decision-making process by which a population chooses an individual or multiple individuals to hold public office. Elections have been the usual mechanism by which modern representative democracy has operated ...
. In many other situations (like conversation between strangers, buying some product or service in a shop), anonymity is traditionally accepted as natural. There are also various situations in which a person might choose to withhold their identity. Acts of
charity Charity may refer to: Giving * Charitable organization or charity, a non-profit organization whose primary objectives are philanthropy and social well-being of persons * Charity (practice), the practice of being benevolent, giving and sharing * C ...
have been performed anonymously when benefactors do not wish to be acknowledged. A person who feels threatened might attempt to mitigate that threat through anonymity. A witness to a crime might seek to avoid retribution, for example, by anonymously calling a crime tipline. Criminals might proceed anonymously to conceal their participation in a crime. Anonymity may also be created unintentionally, through the loss of identifying information due to the passage of time or a destructive event. In certain situations, however, it may be illegal to remain anonymous. For example, 24 of the U.S. states have "stop and identify" statutes that require persons detained to self-identify when requested by a law enforcement officer. The term "anonymous message" typically refers to a message that does not reveal its sender. In many countries, anonymous letters are protected by law and must be delivered as regular letters. In
mathematics Mathematics is an area of knowledge that includes the topics of numbers, formulas and related structures, shapes and the spaces in which they are contained, and quantities and their changes. These topics are represented in modern mathematics ...
, in reference to an arbitrary element (e.g., a human, an object, a
computer A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations ( computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These prog ...
), within a well-defined
set Set, The Set, SET or SETS may refer to: Science, technology, and mathematics Mathematics *Set (mathematics), a collection of elements *Category of sets, the category whose objects and morphisms are sets and total functions, respectively Electro ...
(called the "anonymity set"), "anonymity" of that element refers to the property of that element of not being identifiable within this set. If it is not identifiable, then the element is said to be "anonymous."


Pseudonymity

Sometimes a person may desire a long-term relationship (such as a reputation) with another party without necessarily disclosing
personally identifying information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
to that party. In this case, it may be useful for the person to establish a unique identifier, called a
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name ( orthonym). This also differs from a new name that entirely or legally replaces an individu ...
. Examples of pseudonyms are
pen name A pen name, also called a ''nom de plume'' or a literary double, is a pseudonym (or, in some cases, a variant form of a real name) adopted by an author and printed on the title page or by-line of their works in place of their real name. A pen na ...
s,
nickname A nickname is a substitute for the proper name of a familiar person, place or thing. Commonly used to express affection, a form of endearment, and sometimes amusement, it can also be used to express defamation of character. As a concept, it is ...
s,
credit card number A payment card number, primary account number (PAN), or simply a card number, is the card identifier found on payment cards, such as credit cards and debit cards, as well as stored-value cards, gift cards and other similar cards. In some situati ...
s, student numbers,
bank account A bank account is a financial account maintained by a bank or other financial institution in which the financial transactions between the bank and a customer are recorded. Each financial institution sets the terms and conditions for each type of ...
numbers, etc. A pseudonym enables the other party to link different messages from the same person and, thereby, to establish a long-term relationship. Pseudonyms are widely used in
social network A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods fo ...
s and other virtual communication, although recently some important service providers like Google try to discourage pseudonymity. Someone using a pseudonym would be strictly considered to be using "pseudonymity" not "anonymity", but sometimes the latter is used to refer to both (in general, a situation where the legal identity of the person is disguised).


Psychological effects

Anonymity may reduce the accountability one perceives to have for their actions, and removes the impact these actions might otherwise have on their reputation. This can have dramatic effects, both useful and harmful to various parties involved. Thus, it may be used for psychological tactics involving any respective party to purport or support or discredit any sort of activity or belief. In conversational settings, anonymity may allow people to reveal personal history and feelings without fear of later embarrassment. Electronic conversational media can provide physical isolation, in addition to anonymity. This prevents physical retaliation for remarks, and prevents negative or
taboo A taboo or tabu is a social group's ban, prohibition, or avoidance of something (usually an utterance or behavior) based on the group's sense that it is excessively repulsive, sacred, or allowed only for certain persons.''Encyclopædia Britannica ...
behavior or discussion from tarnishing the reputation of the speaker. This can be beneficial when discussing very private matters, or taboo subjects or expressing views or revealing facts that may put someone in physical, financial, or legal danger (such as illegal activity, or unpopular, or outlawed political views). In work settings, the three most common forms of anonymous communication are traditional suggestion boxes, written feedback, and
Caller ID Caller identification (Caller ID) is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits a caller's telephone number to the called party's telephone equipment when the call i ...
blocking. Additionally, the appropriateness of anonymous organizational communication varies depending on the use, with organizational surveys or assessments typically perceived as highly appropriate and firing perceived as highly inappropriate. Anonymity use and appropriateness have also been found to be significantly related to the quality of relationships with key others at work. With few perceived negative consequences, anonymous or semi-anonymous forums often provide a soapbox for disruptive conversational behavior. The term "
troll A troll is a being in Nordic folklore, including Norse mythology. In Old Norse sources, beings described as trolls dwell in isolated areas of rocks, mountains, or caves, live together in small family units, and are rarely helpful to human ...
" is sometimes used to refer to those who engage in such disruptive behavior. Relative anonymity is often enjoyed in large crowds. Different people have different psychological and philosophical reactions to this development, especially as a modern phenomenon. This anonymity is an important factor in
crowd psychology Crowd psychology, also known as mob psychology, is a branch of social psychology. Social psychologists have developed several theories for explaining the ways in which the psychology of a crowd differs from and interacts with that of the individ ...
, and behavior in situations such as a
riot A riot is a form of civil disorder commonly characterized by a group lashing out in a violent public disturbance against authority, property, or people. Riots typically involve destruction of property, public or private. The property targete ...
. This perceived anonymity can be compromised by technologies such as
photography Photography is the art, application, and practice of creating durable images by recording light, either electronically by means of an image sensor, or chemically by means of a light-sensitive material such as photographic film. It is emplo ...
.
Groupthink Groupthink is a psychological phenomenon that occurs within a group of people in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome. Cohesiveness, or the desire for cohesiveness ...
behavior and
conformity Conformity is the act of matching attitudes, beliefs, and behaviors to group norms, politics or being like-minded. Norms are implicit, specific rules, shared by a group of individuals, that guide their interactions with others. People often cho ...
are also considered to be an established effect of internet anonymity. Anonymity also permits highly trained professionals such as
judge A judge is a person who presides over court proceedings, either alone or as a part of a panel of judges. A judge hears all the witnesses and any other evidence presented by the barristers or solicitors of the case, assesses the credibility an ...
s to freely express themselves regarding the strategies they employ to perform their jobs objectively.


Anonymity, commerce, and crime

Anonymous commercial transactions can protect the privacy of consumers. Some consumers prefer to use cash when buying everyday goods (like groceries or tools), to prevent sellers from aggregating information or soliciting them in the future. Credit cards are linked to a person's name, and can be used to discover other information, such as postal address, phone number, etc. The
ecash Ecash was conceived by David Chaum as an anonymous cryptographic electronic money or electronic cash system in 1983. It was realized through his corporation Digicash and used as micropayment system at one US bank from 1995 to 1998. Design Chaum ...
system was developed to allow secure anonymous transactions. Another example would be Enymity, which actually makes a purchase on a customer's behalf. When purchasing taboo goods and services, anonymity makes many potential consumers more comfortable with or more willing to engage in the transaction. Many
loyalty program A loyalty program is a marketing strategy designed to encourage customers to continue to shop at or use the services of a business associated with the program. Today, such programs cover most types of commerce, each having varying features and ...
s use cards that personally identify the consumer engaging in each transaction (possibly for later solicitation, or for redemption or security purposes), or that act as a numerical
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name ( orthonym). This also differs from a new name that entirely or legally replaces an individu ...
, for use in data mining. Anonymity can also be used as a protection against legal prosecution. For example, when committing unlawful actions, many criminals attempt to avoid identification by the means of obscuring/covering their faces with
scarves A scarf, plural ''scarves'', is a piece of fabric worn around the neck or head for warmth, sun protection, cleanliness, fashion, religious reasons, or used to show the support for a sports club or team. They can be made in a variety of diffe ...
or
mask A mask is an object normally worn on the face, typically for protection, disguise, performance, or entertainment and often they have been employed for rituals and rights. Masks have been used since antiquity for both ceremonial and pra ...
s, and wear
gloves A glove is a garment covering the hand. Gloves usually have separate sheaths or openings for each finger and the thumb. If there is an opening but no (or a short) covering sheath for each finger they are called fingerless gloves. Fingerless glo ...
or other hand coverings in order to not leave any
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
s. In
organized crime Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally th ...
, groups of criminals may collaborate on a certain project without revealing to each other their names or other personally identifiable information. The movie '' The Thomas Crown Affair'' depicted a fictional collaboration by people who had never previously met and did not know who had recruited them. The anonymous purchase of a gun or knife to be used in a crime helps prevent linking an abandoned weapon to the identity of the perpetrator.


Anonymity in charity

There are two aspects, one, giving to a large charitable organization obscures the beneficiary of a donation from the benefactor, the other is giving anonymously to obscure the benefactor both from the beneficiary and from everyone else. Anonymous charity has long been a widespread and durable moral precept of many ethical and religious systems, as well as being in practice a widespread human activity. A benefactor may not wish to establish any relationship with the beneficiary, particularly if the beneficiary is perceived as being unsavory. Benefactors may not wish to identify themselves as capable of giving. A benefactor may wish to improve the world, as long as no one knows who did it, out of modesty, wishing to avoid publicity. Another reason for anonymous charity is a benefactor who does not want a charitable organization to pursue them for more donations, sometimes aggressively.


Issues facing the anonymous

Attempts at anonymity are not always met with support from society. Anonymity sometimes clashes with the policies and procedures of governments or private organizations. In the United States, disclosure of identity is required to be able to
vote Voting is a method by which a group, such as a meeting or an electorate, can engage for the purpose of making a collective decision or expressing an opinion usually following discussions, debates or election campaigns. Democracies elect holde ...
, though the
secret ballot The secret ballot, also known as the Australian ballot, is a voting method in which a voter's identity in an election or a referendum is anonymous. This forestalls attempts to influence the voter by intimidation, blackmailing, and potential vo ...
prevents disclosure of individual voting patterns. In
airport An airport is an aerodrome with extended facilities, mostly for commercial air transport. Airports usually consists of a landing area, which comprises an aerially accessible open space including at least one operationally active surfa ...
s in most countries, passengers are not allowed to board flights unless they have identified themselves to airline or transportation security personnel, typically in the form of the presentation of an
identification card An identity document (also called ID or colloquially as papers) is any documentation, document that may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card (IC, ID c ...
. On the other hand, some policies and procedures require anonymity.


Referring to the anonymous

When it is necessary to refer to someone who is anonymous, it is typically necessary to create a type of pseudo-identification for that person. In literature, the most common way to state that the identity of an author is unknown is to refer to them as simply "Anonymous". This is usually the case with older texts in which the author is long dead and unable to claim authorship of a work. When the work claims to be that of some famous author the
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name ( orthonym). This also differs from a new name that entirely or legally replaces an individu ...
ous author is identified as "Pseudo-", as in
Pseudo-Dionysius the Areopagite Pseudo-Dionysius the Areopagite (or Dionysius the Pseudo-Areopagite) was a Greek author, Christian theologian and Neoplatonic philosopher of the late 5th to early 6th century, who wrote a set of works known as the ''Corpus Areopagiticum'' ...
, an author claiming—and long believed—to be
Dionysius the Areopagite Dionysius the Areopagite (; grc-gre, Διονύσιος ὁ Ἀρεοπαγίτης ''Dionysios ho Areopagitēs'') was an Athenian judge at the Areopagus Court in Athens, who lived in the first century. A convert to Christianity, he is venerat ...
, an early Christian convert. ''Anonymus'', in its
Latin Latin (, or , ) is a classical language belonging to the Italic languages, Italic branch of the Indo-European languages. Latin was originally a dialect spoken in the lower Tiber area (then known as Latium) around present-day Rome, but through ...
spelling, generally with a specific city designation, is traditionally used by scholars in the humanities to refer to an ancient writer whose name is not known, or to a manuscript of their work. Many such writers have left valuable historical or literary records: an incomplete list of such ''Anonymi'' is at
Anonymus Anonymus is the Latin spelling of anonymous, traditionally used by scholars in the humanities for any ancient writer whose name is not known, or to a manuscript of their work. Such writers have left valuable historical or literary records through ...
. In the
history of art The history of art focuses on objects made by humans for any number of spiritual, narrative, philosophical, symbolic, conceptual, documentary, decorative, and even functional and other purposes, but with a primary emphasis on its aesthetics, ae ...
, many painting workshops can be identified by their characteristic style and discussed and the workshop's output set in chronological order. Sometimes archival research later identifies the name, as when the "Master of Flémalle"—defined by three paintings in the Städelsches Kunstinstitut in
Frankfurt Frankfurt, officially Frankfurt am Main (; Hessian: , " Frank ford on the Main"), is the most populous city in the German state of Hesse. Its 791,000 inhabitants as of 2022 make it the fifth-most populous city in Germany. Located on it ...
— was identified as
Robert Campin Robert Campin (c. 1375 – 26 April 1444), now usually identified with the Master of Flémalle (earlier the Master of the Merode Triptych, before the discovery of three other similar panels), was the first great master of Early Netherlandish paint ...
. The 20th-century art historian
Bernard Berenson Bernard Berenson (June 26, 1865 – October 6, 1959) was an American art historian specializing in the Renaissance. His book ''The Drawings of the Florentine Painters'' was an international success. His wife Mary is thought to have had a large ...
methodically identified numerous early Renaissance Florentine and Sienese workshops under such
sobriquet A sobriquet ( ), or soubriquet, is a nickname, sometimes assumed, but often given by another, that is descriptive. A sobriquet is distinct from a pseudonym, as it is typically a familiar name used in place of a real name, without the need of expla ...
s as "Amico di Sandro" for an anonymous painter in the immediate circle of
Sandro Botticelli Alessandro di Mariano di Vanni Filipepi ( – May 17, 1510), known as Sandro Botticelli (, ), was an Italian Renaissance painting, Italian painter of the Early Renaissance. Botticelli's posthumous reputation suffered until the late 19th cent ...
. In legal cases, a popularly accepted name to use when it is determined that an individual needs to maintain anonymity is "
John Doe John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used when the true name of a person is unknown or is being intentionally concealed. In the context of law enforcement in the United States, such names are ofte ...
". This name is often modified to "Jane Doe" when the anonymity-seeker is female. The same names are also commonly used when the identification of a dead person is not known. The semi-acronym Unsub is used as law enforcement slang for "Unknown Subject of an Investigation". The
military A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. It is typically authorized and maintained by a sovereign state, with its members identifiable by their distinct ...
often feels a need to honor the remains of soldiers for whom identification is impossible. In many countries, such a memorial is named the Tomb of the Unknown Soldier.


Anonymity and the press

Most modern newspapers and magazines attribute their articles to individual editors, or to
news agencies A news agency is an organization that gathers news reports and sells them to subscribing news organizations, such as newspapers, magazines and radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, ...
. An exception is the Markker weekly ''
The Economist ''The Economist'' is a British weekly newspaper printed in demitab format and published digitally. It focuses on current affairs, international business, politics, technology, and culture. Based in London, the newspaper is owned by The Eco ...
.'' All
British newspapers Twelve daily newspapers and eleven Sunday-only weekly newspapers are distributed nationally in the United Kingdom. Others circulate in Scotland only and still others serve smaller areas. National daily newspapers publish every day except Sunday ...
run their leaders, or
editorials An editorial, or leading article (UK) or leader (UK) is an article written by the senior editorial people or publisher of a newspaper, magazine, or any other written document, often unsigned. Australian and major United States newspapers, such ...
, anonymously. ''The Economist'' fully adopts this policy, saying "Many hands write ''The Economist'', but it speaks with a collective voice". Guardian considers that ''"people will often speak more honestly if they are allowed to speak anonymously"''. According to Ross Eaman, in his book ''The A to Z of Journalism'', until the mid-19th century, most writers in Great Britain, especially the less well known, did not sign their names to their work in newspapers, magazines and reviews.


Anonymity on the Internet

Most commentary on the Internet is essentially done anonymously, using unidentifiable pseudonyms. However this has been widely discredited in a study by the University of Birmingham, which found that the number of people who use the internet anonymously is statistically the same as the number of people who use the internet to interact with friends or known contacts. While these usernames can take on an identity of their own, they are sometimes separated and anonymous from the actual author. According to the University of Stockholm this is creating more freedom of expression, and less accountability.
Wikipedia Wikipedia is a multilingual free online encyclopedia written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and using a wiki-based editing system. Wikipedia is the largest and most-read refer ...
is collaboratively written mostly by authors using either unidentifiable pseudonyms or
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
identifiers, although a few have used identified pseudonyms or their real names. However, the Internet was not designed for anonymity:
IP addresses An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
serve as virtual mailing addresses, which means that any time any resource on the Internet is accessed, it is accessed from a particular IP address, and the data traffic patterns to and from IP addresses can be intercepted, monitored, and analysed, even if the content of that traffic is encrypted. This address can be mapped to a particular
Internet Service Provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise priva ...
(ISP), and this ISP can then provide information about what customer that IP address was leased to. This does not necessarily implicate a specific individual (because other people could be using that customer's connection, especially if the customer is a public resource, such as a library), but it provides regional information and serves as powerful circumstantial evidence. Anonymizing services such as
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...
and Tor address the issue of IP tracking. In short, they work by encrypting packets within multiple layers of encryption. The packet follows a predetermined route through the anonymizing network. Each router sees the immediate previous router as the origin and the immediate next router as the destination. Thus, no router ever knows both the true origin and destination of the packet. This makes these services more secure than centralized anonymizing services (where a central point of knowledge exists). Sites such as
Chatroulette Chatroulette is an online chat website that pairs random users with a choice between two other users for webcam-based conversations. Visitors to the website begin an online chat (audio, and video) with another visitor. At any point, either user ...
,
Omegle Omegle is a free online chat website that allows users to socialize with others without the need to register. The service randomly pairs users in one-on-one chat sessions where they chat anonymously using the names "You" and "Stranger" or "Str ...
, and
Tinder Tinder is easily combustible material used to start a fire. Tinder is a finely divided, open material which will begin to glow under a shower of sparks. Air is gently wafted over the glowing tinder until it bursts into flame. The flaming tinder i ...
(which pair up random users for a conversation) capitalized on a fascination with anonymity. Apps like
Yik Yak Yik Yak is a pseudonymous social media smartphone application that initially launched in 2013 and relaunched in 2021. The app, which is available for iOS and Android, allows people to create and view discussion threads within a radius (termed ...
, Secret and
Whisper Whispering is an unvoiced mode of phonation in which the vocal cords are abducted so that they do not vibrate; air passes between the arytenoid cartilages to create audible turbulence during speech. Supralaryngeal articulation remains the ...
let people share things anonymously or quasi-anonymously whereas
Random In common usage, randomness is the apparent or actual lack of pattern or predictability in events. A random sequence of events, symbols or steps often has no order and does not follow an intelligible pattern or combination. Individual ran ...
let the user to explore the web anonymously. Other sites, however, including
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dust ...
and
Google+ Google+ (pronounced and sometimes written as Google Plus; sometimes called G+) was a social network owned and operated by Google. The network was launched on June 28, 2011, in an attempt to challenge other social networks, linking other Google p ...
, ask users to sign in with their legal names. In the case of Google+, this requirement led to a controversy known as the
nymwars Nymwars is a name given to series of conflicts over policies that mandate all users of certain internet communications platforms identify themselves using their legal names. The term is mostly associated with Google's name policies on Google+ and ...
. The prevalence of
cyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
is often attributed to relative Internet anonymity, due to the fact that potential offenders are able to mask their identities and prevent themselves from being caught. A principal in a high school stated that comments made on these anonymous site are "especially vicious and hurtful since there is no way to trace their source and it can be disseminated widely. "Cyberbullying, as opposed to general bullying, is still a widely-debated area of
Internet freedom Internet freedom is an umbrella term that encompasses digital rights, freedom of information, the right to Internet access, freedom from Internet censorship, and net neutrality. Some believe that Internet freedom is not a human right. They thin ...
in several states. Though Internet anonymity can provide a harmful environment through which people can hurt others, anonymity can allow for a much safer and relaxed internet experience. In a study conducted at Carnegie Mellon University, 15 out of 44 participants stated that they choose to be anonymous online because of a prior negative experience during which they did not maintain an anonymous presence.Kang et al. (2013). Why Do People Seek Anonymity on the Internet? Informing Policy and Design. CHI 2013. Such experiences include stalking, releasing private information by an opposing school political group, or tricking an individual into traveling to another country for a job that did not exist. Participants in this study stated that they were able to avoid their previous problems by using false identification online.
David Chaum David Lee Chaum (born 1955) is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertati ...
is called the Godfathers of anonymity and he has a claim to be one of the great visionaries of contemporary science. In the early 1980s, while a computer scientist at Berkeley, Chaum predicted the world in which computer networks would make mass surveillance a possibility. As Dr. Joss Wright explains: "David Chaum was very ahead of his time. He predicted in the early 1980s concerns that would arise on the internet 15 or 20 years later." There are some people though that consider anonymity in internet being a danger for our society as a whole. David Davenport, an assistant professor in the Computer Engineering Department of Bilkent University in Ankara, Turkey, considers that by allowing anonymous Net communication, the fabric of our society is at risk. "Accountability requires those responsible for any misconduct be identified and brought to justice. However, if people remain anonymous, by definition, they cannot be identified, making it impossible to hold them accountable." he says.


Arguments for and against anonymity

As A. Michael Froomkin says: "''The regulation of anonymous and pseudonymous communications promises to be one of the most important and contentious Internet-related issues of the next decade".'' Anonymity and pseudonymity can be used for good and bad purposes. And anonymity can in many cases be desirable for one person and not desirable for another person. A company may, for example, not like an employee to divulge information about improper practices within the company, but society as a whole may find it important that such improper practices are publicly exposed. Good purposes of anonymity and pseudonymity: * People dependent on an organization, or afraid of revenge, may divulge serious misuse, which should be revealed. Anonymous tips can be used as an information source by newspapers, as well as by police departments, soliciting tips aimed at catching criminals. Not everyone will regard such anonymous communication as good. For example, message boards established outside companies, but for employees of such companies to vent their opinions on their employer, have sometimes been used in ways that at least the companies themselves were not happy about
belson 2001 The surname Belson may refer to: * Charles Belson (1773–1830), British Army officer of the Napoleonic Era * Flavien Belson (born 1987), footballer * Frederick Belson (1874-1952), English rugby union player * Jerry Belson (1938-2006), director and ...
Police use of anonymity is a complex issue, since the police often will want to know the identity of the tipper in order to get more information, evaluate the reliability or get the tipper as a witness. Is it ethical for police to identify the tipper if it has opened up an anonymous tipping hotline? * People in a country with a repressive political regime may use anonymity (for example Internet-based anonymity servers in other countries) to avoid persecution for their political opinions. Note that even in democratic countries, some people claim, rightly or wrongly, that certain political opinions are persecuted. allace 1999gives an overview of uses of anonymity to protect political speech. Every country has a limit on which political opinions are allowed, and there are always people who want to express forbidden opinions, like racial agitation in most democratic countries. * People may openly discuss personal stuff which would be embarrassing to tell many people about, such as sexual problems. Research shows that anonymous participants disclose significantly more information about themselves oinson 2001 People might also feel more open to sharing their personal work anonymously if they feel that their friends and family would harass them or disapprove of their work. Examples of such work could include
fan fiction Fan fiction or fanfiction (also abbreviated to fan fic, fanfic, fic or FF) is fictional writing written in an amateur capacity by fans, unauthorized by, but based on an existing work of fiction. The author uses copyrighted characters, setti ...
or vocal performances. * People may get more objective evaluation of their messages, by not showing their real name. * People are more equal in anonymous discussions, factors like status, gender, etc., will not influence the evaluation of what they say. * Pseudonymity can be used to experiment with role playing, for example a man posing as a woman in order to understand the feelings of people of different gender. * Pseudonymity can be a tool for timid people to dare establish contacts which can be of value for them and others, e.g. through contact advertisements. * People can contribute to online social discussion with reduced risk of harm by online predators. Online predators include "criminals, hackers, scammers, stalkers, and malicious online vendors." * People can avoid becoming famous by publishing their work anonymously. There has always, however, also been a negative side of anonymity: * Anonymity can be used to protect a criminal performing many different crimes, for example slander, distribution of child pornography, illegal threats, racial agitation, fraud, intentional damage such as distribution of computer viruses, etc. The exact set of illegal acts varies from country to country, but most countries have many laws forbidding certain "informational" acts, everything from high treason to instigation of rebellion, etc., to swindling. * Anonymity can be used for online payments for criminals paying others to perform illegal acts or purchases. * Anonymity can be used to seek contacts for performing illegal acts, like a
Child grooming Child grooming is befriending and establishing an emotional connection with a minor under the age of consent, and sometimes the child's family, to lower the child's inhibitions with the objective of sexual abuse. Child grooming is also regularly ...
searching for children to abuse or a swindler searching for people to rip off. * Even when the act is not illegal, anonymity can be used for offensive or disruptive communication. For example, some people use anonymity in order to say harmful things about other people, known as
cyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
. *
Internet troll In slang, a troll is a person who posts or makes inflammatory, insincere, digressive, extraneous, or off-topic messages online (such as in social media, a newsgroup, a forum, a chat room, a online video game), or in real life, with the i ...
s use anonymity to harm discussions in online social platforms. The border between illegal and legal but offensive use is not very sharp, and varies depending on the law in each country.


Anonymous (group)

Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anony ...
(used as a mass noun) is a loosely associated international network of activist and
hacktivist In Internet activism, hacktivism, or hactivism (a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in ha ...
entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives". The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate websites. An image commonly associated with Anonymous is the "man without a head" represents leaderless organization and anonymity.


Legal protection of anonymity

Anonymity is perceived as a right by many, especially the anonymity in the internet communications. The partial right for anonymity is legally protected to various degrees in different jurisdictions.


United States

The tradition of anonymous speech is older than the United States. Founders
Alexander Hamilton Alexander Hamilton (January 11, 1755 or 1757July 12, 1804) was an American military officer, statesman, and Founding Father who served as the first United States secretary of the treasury from 1789 to 1795. Born out of wedlock in Charle ...
,
James Madison James Madison Jr. (March 16, 1751June 28, 1836) was an American statesman, diplomat, and Founding Father. He served as the fourth president of the United States from 1809 to 1817. Madison is hailed as the "Father of the Constitution" for h ...
, and
John Jay John Jay (December 12, 1745 – May 17, 1829) was an American statesman, patriot, diplomat, abolitionist, signatory of the Treaty of Paris, and a Founding Father of the United States. He served as the second governor of New York and the f ...
wrote ''
The Federalist Papers ''The Federalist Papers'' is a collection of 85 articles and essays written by Alexander Hamilton, James Madison, and John Jay under the collective pseudonym "Publius" to promote the ratification of the Constitution of the United States. The c ...
'' under the pseudonym "Publius" and "the Federal Farmer" spoke up in rebuttal. The
US Supreme Court The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all U.S. federal court cases, and over state court cases that involve a point of ...
has repeatedly recognized rights to speak anonymously derived from the First Amendment. * The right to ''anonymous political campaigning'' was established in the U.S. Supreme Court decision in ''
McIntyre v. Ohio Elections Commission ''McIntyre v. Ohio Elections Commission'', 514 U.S. 334 (1995), is a case in which the Supreme Court of the United States held that an Ohio statute prohibiting anonymous campaign literature is unconstitutional because it violates the First Amend ...
'' (1995) case: "Anonymity is a shield from the tyranny of the majority...It thus exemplifies the purpose behind the
Bill of Rights A bill of rights, sometimes called a declaration of rights or a charter of rights, is a list of the most important rights to the citizens of a country. The purpose is to protect those rights against infringement from public officials and pr ...
, and of the First Amendment in particular: to protect unpopular individuals from retaliation—and their ideas from suppression—at the hand of an intolerant society". The Supreme court explained that protecting anonymous political speech receives the highest protection however, this priority takes on new dimensions in the digital age. * The right of individuals for "anonymous communication" was established by the decision in case ''Columbia Insurance Company v. Seescandy.com, et al.'' (1999) of the
United States District Court for the Northern District of California The United States District Court for the Northern District of California (in case citations, N.D. Cal.) is the federal United States district court whose jurisdiction comprises the following counties of California: Alameda, Contra Costa, De ...
: "People are permitted to interact pseudonymously and anonymously with each other so long as those acts are not in violation of the law". * The right of individuals for "anonymous reading" was established in the U.S. Supreme Court decision in ''United States v. Rumely'' (1953): "Once the government can demand of a publisher the names of the purchasers of his publications, the free press as we know it disappears. Then the spectre of a government agent will look over the shoulder of everyone who reads". The pressure on anonymous communication has grown substantially after the 2001 terrorist attack on the World Trade Center and the subsequent new political climate. Although it is still difficult to oversee their exact implications, measures such as the US Patriot Act, the European Cybercrime Convention and the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are located primarily in Europe, Europe. The union has a total area of ...
rules on
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different ...
are only few of the signs that the exercise of the right to the anonymous exchange of information is under substantial pressure. An above-mentioned 1995 Supreme Court ruling in ''McIntyre v. Ohio Elections Commission'' reads: ''"(...) protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society."'' However, anonymous online speech is not without limits. It is clearly demonstrated in a case from 2008, one in which the defendant stated on a law-school discussion board that two women should be raped, an anonymous poster's comments may extend beyond free speech protections. In the case, a Connecticut federal court must apply a standard to decide whether the poster's identity should be revealed. There are several tests, however, that the court could apply when considering this issue.


European Union

The right to internet anonymity is also covered by European legislation that recognizes the fundamental right to
data protection Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data p ...
,
freedom of expression Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recog ...
, freedom of impression. The
European Union Charter of Fundamental Rights The Charter of Fundamental Rights of the European Union (CFR) enshrines certain political, social, and economic rights for European Union (EU) citizens and residents into EU law. It was drafted by the European Convention and solemnly proclai ...
recognizes in Article. 8 (Title II: “Freedoms”) the right of everyone to protection of personal data concerning him. The right to privacy is now essentially the individual's right to have and to maintain control over information about him.


International legislation

One of the most controversial international legal acts, regarding this subject is Anti-Counterfeiting Trade Agreement (ACTA). As of February 2015, the treaty was signed -but not all ratified- by 31 states as well as the European Union. Japan was on 4 October 2012 the first to ratify the treaty. It creates an international regime for imposing civil and criminal penalties on Internet counterfeiting and copyright infringement. Although ACTA is intentionally vague, leaving signatories to draw precise rules themselves, critics say it could mean innocent travellers having their laptops searched for unlicensed music, or being jailed for carrying a
generic drug A generic drug is a pharmaceutical drug that contains the same chemical substance as a drug that was originally protected by chemical patents. Generic drugs are allowed for sale after the patents on the original drugs expire. Because the active c ...
. Infringers could be liable for the total loss of potential sales (implying that everyone who buys a counterfeit product would have bought the real thing). It applies to unintentional use of copyright material. It puts the onus on website owners to ensure they comply with laws across several territories. It has been negotiated secretively and outside established international trade bodies, despite EU criticisms.


Anonymity and politics

The history of anonymous expression in political dissent is both long and with important effect, as in the
Letters of Junius ''Letters of Junius'' (or Junius: ''Stat nominis umbra'') is a collection of private and open letters critical of the government of King George III from an anonymous polemicist ( Junius) claimed by some to be Philip Francis (although Junius' real ...
or
Voltaire François-Marie Arouet (; 21 November 169430 May 1778) was a French Enlightenment writer, historian, and philosopher. Known by his '' nom de plume'' M. de Voltaire (; also ; ), he was famous for his wit, and his criticism of Christianity—e ...
's ''
Candide ( , ) is a French satire written by Voltaire, a philosopher of the Age of Enlightenment, first published in 1759. The novella has been widely translated, with English versions titled ''Candide: or, All for the Best'' (1759); ''Candide: or, Th ...
'', or scurrilous as in
pasquinade A pasquinade or pasquil is a form of satire, usually an anonymous brief lampoon in verse or prose, and can also be seen as a form of literary caricature. The genre became popular in early modern Europe, in the 16th century, though the term had ...
s. In the tradition of anonymous British political criticism, ''
The Federalist Papers ''The Federalist Papers'' is a collection of 85 articles and essays written by Alexander Hamilton, James Madison, and John Jay under the collective pseudonym "Publius" to promote the ratification of the Constitution of the United States. The c ...
'' were anonymously authored by three of America's
Founding Fathers The following list of national founding figures is a record, by country, of people who were credited with establishing a state. National founders are typically those who played an influential role in setting up the systems of governance, (i.e. ...
. Without the public discourse on the controversial contents of the U.S. Constitution, ratification would likely have taken much longer as individuals worked through the issues. The
United States Declaration of Independence The United States Declaration of Independence, formally The unanimous Declaration of the thirteen States of America, is the pronouncement and founding document adopted by the Second Continental Congress meeting at Pennsylvania State House ( ...
, however, was not anonymous. If it had been unsigned, it might well have been less effective.
John Perry Barlow John Perry Barlow (October 3, 1947February 7, 2018) was an American poet, essayist, cattle rancher, and cyberlibertarian political activist who had been associated with both the Democratic and Republican parties. He was also a lyricist for th ...
,
Joichi Ito is a Japanese entrepreneur and venture capitalist. He is a former director of the MIT Media Lab, former professor of the practice of media arts and sciences at MIT, and a former visiting professor of practice at the Harvard Law School. Ito has re ...
, and other U.S.
blog A blog (a Clipping (morphology), truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in Reverse ...
gers express a very strong support for anonymous editing as one of the basic requirements of
open politics Open-source governance (also known as open governance and open politics) is a political philosophy which advocates the application of the philosophies of the open-source and open-content movements to democratic principles to enable any intere ...
as conducted on the Internet.


Anonymity and pseudonymity in art

Anonymity is directly related to the concept of
obscurantism In philosophy, the terms obscurantism and obscurationism describe the anti-intellectual practices of deliberately presenting information in an abstruse and imprecise manner that limits further inquiry and understanding of a subject. There are two ...
or
pseudonymity A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name ( orthonym). This also differs from a new name that entirely or legally replaces an individu ...
, where an artist or a group attempts to remain anonymous, for various reasons such as adding an element of mystique to themselves or their work, attempting to avoid what is known as the "
cult of personality A cult of personality, or a cult of the leader, Mudde, Cas and Kaltwasser, Cristóbal Rovira (2017) ''Populism: A Very Short Introduction''. New York: Oxford University Press. p. 63. is the result of an effort which is made to create an id ...
" or hero worship (in which the
charisma Charisma () is a personal quality of presence or charm that compels its subjects. Scholars in sociology, political science, psychology, and management reserve the term for a type of leadership seen as extraordinary; in these fields, the term "ch ...
, good looks, wealth or other unrelated or mildly related aspects of the people is the main reason for interest in their work, rather than the work itself) or to break into a field or area of interest normally dominated by males (as by the famous
science fiction Science fiction (sometimes shortened to Sci-Fi or SF) is a genre of speculative fiction which typically deals with imaginative and futuristic concepts such as advanced science and technology, space exploration, time travel, parallel uni ...
author
James Tiptree, Jr Alice Bradley Sheldon (born Alice Hastings Bradley; August 24, 1915 – May 19, 1987) was an American science fiction and fantasy author better known as James Tiptree, Jr., a pen name she used from 1967 to her death. It was not publicly known un ...
who was actually a woman named Alice Bradley Sheldon, and likely
JT LeRoy Jeremiah Terminator LeRoy, or simply JT LeRoy is a literary persona created in the 1990s by American writer Laura Albert. LeRoy was presented as the author of three books of fiction, which were purportedly semi-autobiographical accounts by a te ...
). Some seem to want to avoid the "limelight" of popularity and to live private lives, such as
Thomas Pynchon Thomas Ruggles Pynchon Jr. ( , ; born May 8, 1937) is an American novelist noted for his dense and complex novels. His fiction and non-fiction writings encompass a vast array of subject matter, genres and themes, including history, music, scie ...
, J. D. Salinger,
De Onbekende Beeldhouwer De Onbekende Beeldhouwer (the Anonymous Sculptor) is an artist or group of artists known for work on street sculptures in Amsterdam through the 1980s and 1990s. At least eight works that attracted public interest have been so attributed, including ...
(an anonymous sculptor whose exhibited work in
Amsterdam Amsterdam ( , , , lit. ''The Dam on the River Amstel'') is the capital and most populous city of the Netherlands, with The Hague being the seat of government. It has a population of 907,976 within the city proper, 1,558,755 in the urban ar ...
attracted strong attention in the 1980s and 1990sDepictions, text in Dutc
Retrieved 23 June 2017.
), and by DJ duo
Daft Punk Daft Punk were a French electronic music duo formed in 1993 in Paris by Thomas Bangalter and Guy-Manuel de Homem-Christo. Widely regarded as one of the most influential acts in dance music history, they achieved popularity in the late 1990s as p ...
(1993-2021). For street artist
Banksy Banksy is a pseudonymous England-based street artist, political activist and film director whose real name and identity remain unconfirmed and the subject of speculation. Active since the 1990s, his satirical street art and subversive epigram ...
, "anonymity is vital to him because graffiti is illegal". Anonymity has been used in music by avant-garde ensemble
The Residents The Residents are an American art collective and art rock band best known for their avant-garde music and multimedia works. Since their first official release, ''Meet the Residents'' (1974), they have released over 60 albums, numerous music vi ...
,
Jandek Jandek is the musical alias of Houston, Texas based lo-fi folk singer Sterling Smith. Since 1978, Jandek has independently released over 45 albums without granting interviews or providing any biographical information, releasing on a self-made lab ...
(until 2004), costumed comedy rock band
The Radioactive Chicken Heads The Radioactive Chicken Heads are an American virtual band formed in Orange, California in 1993. Operating anonymously under the guise of mutant chickens and vegetables, the Chicken Heads' music is primarily a mix of punk rock, heavy metal and ...
, and DJs
Deadmau5 Joel Thomas Zimmerman (born January 5, 1981), known professionally as Deadmau5 (stylized as deadmau5; pronounced "dead-mouse"), is a Canadian electronic music producer and DJ. He mainly produces progressive house music, though he also produce ...
(1998-present) and
Marshmello Christopher Comstock (born May 19, 1992), known professionally as Marshmello, is an American electronic music producer and DJ. His songs "Silence", "Wolves", "Friends", " Happier", and " Alone" have been certified multi-platinum in several ...
(2015-present). This is frequently applied in fiction, from
The Lone Ranger The Lone Ranger is a fictional masked former Texas Ranger who fought outlaws in the American Old West with his Native American friend Tonto. The character has been called an enduring icon of American culture. He first appeared in 1933 in ...
,
Superman Superman is a superhero who appears in American comic books published by DC Comics. The character was created by writer Jerry Siegel and artist Joe Shuster, and debuted in the comic book '' Action Comics'' #1 ( cover-dated June 1938 and pu ...
, and
Batman Batman is a superhero appearing in American comic books published by DC Comics. The character was created by artist Bob Kane and writer Bill Finger, and debuted in the 27th issue of the comic book ''Detective Comics'' on March 30, 1939. I ...
, where a hidden identity is assumed.


Mathematics of anonymity

Suppose that only Alice, Bob, and Carol have keys to a bank safe and that, one day, contents of the safe go missing (lock not violated). Without additional information, we cannot know for sure whether it was Alice, Bob or Carol who emptied the safe. Notably, each element in could be the perpetrator with a probability of 1. However, as long as none of them was convicted with 100% certainty, we must hold that the perpetrator remains anonymous and that the attribution of the probability of 1 to one of the players has to remain undecided. If Carol has a definite alibi at the time of perpetration, then we may deduce that it must have been either Alice or Bob who emptied the safe. In this particular case, the perpetrator is not completely anonymous anymore, as both Alice and Bob now know "who did it" with a probability of 1.


See also

*
List of anonymously published works Throughout the history of literature, since the creation of bound texts in the forms of books and codices, various works have been published and written anonymously, often due to their political or controversial nature, or merely for the purpos ...
*
List of anonymous masters In art history, an anonymous master is an Old Master whose work is known, but whose name is lost. Renaissance Only in the Renaissance did individual artists in Western Europe acquire personalities known by their peers (some listed by Vasari in hi ...
*
Notname In art history, a ''Notname'' (, "necessity-name" or "contingency-name") is an invented name given to an artist whose identity has been lost. The practice arose from the need to give such artists and their typically untitled, or generically title ...
*
Data anonymization Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. Overvi ...
*
Friend-to-friend A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication. Unlike other kinds of private P2P ...
*
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
*
Online disinhibition effect Online disinhibition effect is the lack of restraint one feels when communicating online in comparison to communicating in-person. People feel safer saying things online which they would not say in real life because they have the ability to remain ...
*
Personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
*
Anonymity (social choice) In social choice theory, Anonymity is a basic requirement of a social choice rule. It says that the rule does not discriminate apriori between different voters. In other words, the rule returns the same outcome (whatever this outcome may be) if t ...


Notes


References

{{Authority control