HOME

TheInfoList



OR:

An anonymous post, is an entry on a
textboard A textboard is a simple kind of Internet forum; most textboards require neither registration nor entry of a screen name. Textboards, like imageboards, were invented in Japan, but they remain relatively unknown outside it, in contrast to imageboar ...
, anonymous
bulletin board system A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such ...
, or other discussion forums like
Internet forum An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least tempora ...
, without a screen name or more commonly by using a non-identifiable
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
. Some online forums such as
Slashdot ''Slashdot'' (sometimes abbreviated as ''/.'') is a social news website that originally advertised itself as "News for Nerds. Stuff that Matters". It features news stories concerning science, technology, and politics that are submitted and evalu ...
do not allow such posts, requiring users to be registered either under their
real name A legal name is the name that identifies a person for legal, administrative and other official purposes. A person's legal birth name generally is the name of the person that was given for the purpose of registration of the birth and which then ap ...
or utilizing a
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
. Others like
JuicyCampus JuicyCampus.com was a website focusing on gossip, rumors, and rants related to colleges and universities in the United States. As of February 5, 2009, it is out of business. JuicyCampus described itself as an enabler of "online anonymous free ...
, AutoAdmit,
2channel , also known as 2ch, Channel 2, and sometimes retrospectively as 2ch.net, was an anonymous Japanese textboard founded in 1999 by Hiroyuki Nishimura. Described in 2007 as "Japan's most popular online community", the site had a level of infl ...
, and other Futaba-based imageboards (such as
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
) thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends.


History of online anonymity

Online anonymity can be traced to
Usenet Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was ...
newsgroup A Usenet newsgroup is a repository usually within the Usenet system, for messages posted from users in different locations using the Internet. They are discussion groups and are not devoted to publishing news. Newsgroups are technically distin ...
s in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced. This was primarily used for discussion on newsgroups pertaining to certain sensitive topics. There was also the introduction of anonymous remailers which were capable of stripping away the sender's address from mail packets before sending them to the receiver. Online services which facilitated anonymous posting sprang up around mid-1992, originating with the
cypherpunk A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal gr ...
group. The precursor to Internet forums like
2channel , also known as 2ch, Channel 2, and sometimes retrospectively as 2ch.net, was an anonymous Japanese textboard founded in 1999 by Hiroyuki Nishimura. Described in 2007 as "Japan's most popular online community", the site had a level of infl ...
and
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
were
textboard A textboard is a simple kind of Internet forum; most textboards require neither registration nor entry of a screen name. Textboards, like imageboards, were invented in Japan, but they remain relatively unknown outside it, in contrast to imageboar ...
s like Ayashii World and Amezou World that provided the ability for anonymous posts in Japan. These "large-scale anonymous textboards" were inspired by the Usenet culture and were primarily focused on technology, unlike their descendants. Today, image boards receive tremendous Internet traffic from all parts of the world. In 2011, on 4chan's most popular board, /b/, there were roughly 35,000 threads and 400,000 posts created per day. At that time, that level of content was on par with
YouTube YouTube is a global online video sharing and social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by Google, and is the second most ...
. Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites.


Levels of anonymity

Anonymity on the Internet can pertain to both the utilization of
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
s or requiring no authentication at all (also called "perfect anonymity") for posting on a website. Online anonymity is also limited by
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es. For example, WikiScanner associates anonymous
Wikipedia Wikipedia is a multilingual free online encyclopedia written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and using a wiki-based editing system. Wikipedia is the largest and most-read ref ...
edits with the IP address that made the change and tries to identify the entity that owns the IP address. On other websites, IP addresses may not be publicly available, but they can be obtained from the website administrators only through legal intervention. They might not always be traceable to the poster.


Techniques

Utilizing
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
s allow people to post without revealing their real identity. Pseudonyms, however, are still prone to being tracked to the user's
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
. To avoid being tracked to an IP address, it is possible to post via a public computer where the IP address would usually be under the purview of the public workspace such as a coffee shop, and hence cannot be traced to the individual user.


Memes

Another way people are posting anonymously online is through the use of
memes A meme ( ) is an idea, behavior, or style that spreads by means of imitation from person to person within a culture and often carries symbolic meaning representing a particular phenomenon or theme. A meme acts as a unit for carrying cultural i ...
. One popular meme is the Confession Bear meme. People use Confession Bear to post everything from funny and embarrassing stories to very troubled thoughts.


Technology

There are services described as
anonymizer An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It acce ...
s which aim to provide users the ability to post anonymously by hiding their identifying information. Anonymizers are essentially
proxy server In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a requ ...
s which act as an intermediary between the user who wants to post anonymously and the website which logs user information such as IP addresses. The proxy server is the only computer in this network which is aware of the user's information and provides its own information to anonymize the poster. Examples of such anonymizers include Tor and I2P, which employ techniques such as
onion An onion (''Allium cepa'' L., from Latin ''cepa'' meaning "onion"), also known as the bulb onion or common onion, is a vegetable that is the most widely cultivated species of the genus ''Allium''. The shallot is a botanical variety of the oni ...
and
garlic routing Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer. Michael J. Freedman defined "garlic routing" a ...
(respectively) to provide enhanced
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
to messages that travel through multiple proxy servers. Applications like PGP utilizing techniques like private-key and
public-key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
encryptions are also utilized by users to post content in Usenet groups and other online forums.


Legal standards and regulations


China

The revised draft of the Chinese government's "Internet Information Services" proposes that "Internet information service providers, including
microblog Microblogging is a form of social network that permits only short posts. They "allow users to exchange small elements of content such as short sentences, individual images, or video links",. Retrieved June 5, 2014 which may be the major reason for ...
s, forums, and blogs, that allow users to post information on the Internet should ensure users are registered with their real identities". Starting October 1, 2017, it will require Internet users to identify themselves with their real names to use comments sections on news and social media websites.


The Philippines

The
Philippine The Philippines (; fil, Pilipinas, links=no), officially the Republic of the Philippines ( fil, Republika ng Pilipinas, links=no), * bik, Republika kan Filipinas * ceb, Republika sa Pilipinas * cbk, República de Filipinas * hil, Republ ...
government passed the Cybercrime Prevention Act on 12 September 2012, which among other things grants the
Department of Justice A justice ministry, ministry of justice, or department of justice is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
the ability to "block access to 'computer data' that is in violation of the Act; in other words, a website hosting criminally
libel Defamation is the act of communicating to a third party false statements about a person, place or thing that results in damage to its reputation. It can be spoken (slander) or written (libel). It constitutes a tort or a crime. The legal defi ...
ous speech could be shut down without a court order".


United Kingdom

Under the Defamation Act 2013, in an action against a website operator, on a statement posted on the website, it is a defense to show that it was not the operator who posted the statement on the website. The defense is defeated if it was not possible for the claimant to identify the person who posted the statement.


United States

In the United States, the right to speak anonymously online is protected by the
First Amendment First or 1st is the ordinal form of the number one (#1). First or 1st may also refer to: *World record, specifically the first instance of a particular achievement Arts and media Music * 1$T, American rapper, singer-songwriter, DJ, and reco ...
and various other laws. These laws restrict the ability of the government and civil litigants to obtain the identity of anonymous speakers. The First Amendment says that "Congress shall make no law ... abridging the freedom of speech, or of the press". This protection has been interpreted by the U.S. Supreme Court to protect the right to speak anonymously offline. For example, in '' McIntyre v. Ohio Elections Commission'', the Supreme Court overturned an Ohio law banning the distribution of anonymous election pamphlets, claiming that an "author's decision to remain anonymous ... is an aspect of the freedom of speech protected by the First Amendment" and that "anonymous
pamphleteer Pamphleteer is a historical term for someone who creates or distributes pamphlets, unbound (and therefore inexpensive) booklets intended for wide circulation. Context Pamphlets were used to broadcast the writer's opinions: to articulate a poli ...
ing is not a pernicious, fraudulent practice, but an honorable tradition of
advocacy Advocacy is an Action (philosophy), activity by an individual or advocacy group, group that aims to influence decision making, decisions within political, economic, and social institutions. Advocacy includes activities and publications to infl ...
and of
dissent Dissent is an opinion, philosophy or sentiment of non-agreement or opposition to a prevailing idea or policy enforced under the authority of a government, political party or other entity or individual. A dissenting person may be referred to ...
", as well as a "shield" against the so-called
tyranny of the majority The tyranny of the majority (or tyranny of the masses) is an inherent weakness to majority rule in which the majority of an electorate pursues exclusively its own objectives at the expense of those of the minority factions. This results in oppre ...
.''McIntyre v. Ohio Elections Commission''
514 U.S. 334
(1995).
Various courts have interpreted these offline protections to extend to the online world. Identifying the author of an anonymous post may require a
Doe subpoena A Doe subpoena is a subpoena that seeks the identity of an unknown defendant to a lawsuit. Most jurisdictions permit a plaintiff who does not yet know a defendant's identity to file suit against John Doe and then use the tools of the discovery ...
. This involves gaining access to the IP address of the poster via the hosting website. The courts can then order an ISP to identify the subscriber to whom it had assigned said IP address. Requests for such data are almost always fruitful, though providers will often effect a finite term of
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different ...
(in accordance with the
privacy policy A privacy policy is a statement or legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identify ...
of each—local law may specify a minimum and/or maximum term). The usage of IP addresses has, in recent times, been challenged as a legitimate way to identify anonymous users. On March 21, 2012, the
New York State Senate The New York State Senate is the upper house of the New York State Legislature; the New York State Assembly is its lower house. Its members are elected to two-year terms; there are no term limits. There are 63 seats in the Senate. Partisan com ...
introduced the bill numbered S.6779 (and A.8668) labeled as the "Internet Protection Act". It proposes the ability of a website administrator of a New York–based website to take down anonymous comments unless the original author of the comment agrees to identify themselves on the post.


In online communities

Online communities vary with their stances on anonymous postings.
Wikipedia Wikipedia is a multilingual free online encyclopedia written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and using a wiki-based editing system. Wikipedia is the largest and most-read ref ...
allows anonymous editing in most cases, but does not label users, instead identifying them by their
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es. Other editors commonly refer to these users with neutral terms such as "anons" or "IPs". Many online bulletin boards require users to be signed in to write—and, in some cases, even to read—posts.
2channel , also known as 2ch, Channel 2, and sometimes retrospectively as 2ch.net, was an anonymous Japanese textboard founded in 1999 by Hiroyuki Nishimura. Described in 2007 as "Japan's most popular online community", the site had a level of infl ...
and other Futaba-based image boards take an opposite stance, encouraging the anonymity, and in the case of English-language Futaba-based websites, calling those who use
username A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), account ...
s and
tripcode An imageboard is a type of Internet forum that focuses on the posting of images, often alongside text and discussion. The first imageboards were created in Japan as an extension of the textboard concept. These sites later inspired the creation o ...
s "namefags" and "richeys", respectively. As required by law, even communities such as 4chan do require the logging of IP addresses of such anonymous posters. Such data, however, can only be accessed by the particular site administrator.
Slashdot ''Slashdot'' (sometimes abbreviated as ''/.'') is a social news website that originally advertised itself as "News for Nerds. Stuff that Matters". It features news stories concerning science, technology, and politics that are submitted and evalu ...
discourages anonymous posting by displaying "Anonymous Coward" as the author of each anonymous post. The mildly derogatory term is meant to chide anonymous contributors into logging in.


Ramifications


Effects on users

The effects of posting online anonymously has been linked to the
online disinhibition effect Online disinhibition effect is the lack of restraint one feels when communicating online in comparison to communicating in-person. People feel safer saying things online which they would not say in real life because they have the ability to remain ...
in users whilst been categorized into either benign or toxic disinhibition. Disinhibition can result in misbehavior but can also improve user relationships. It may also result in greater disclosure among Internet users, allowing more emotional closeness and openness in a safe social context. Anonymous computer communication has also been linked to accentuate
self-stereotyping Within social psychology self-stereotyping (or autostereotyping) is a process described as part of social identity theory (SIT) and, more specifically, self-categorization theory (SCT). Self-stereotyping occurs when an individual integrates com ...
. Although it has been linked to notable effects in gender differences, only when the topic bears similarity and fits with the gender stereotype. A 2015 study suggested that anonymous news comment sections are more susceptible to uncivil comments, especially those directed at other users. Anonymous news comment section users are also more likely to be impolite by either being sarcastic and casting aspersions. With regard to a recent hostile subpoena in California, commentators have asked if there will be a "Layfield & Barrett effect" chilling job review posting free speech. On May 2, 2016, through its lawyers, Layfield and Barrett and partner Phil Layfield issued a subpoena on
Glassdoor Glassdoor is an American website where current and former employees anonymously review companies. Headquartered in San Francisco, California, it has additional offices in Chicago, Dublin, London, and São Paulo. Glassdoor also allows its users to ...
seeking the online identities of former employees who posted extremely critical and negative reviews. Glassdoor executives have stated that they will fight the subpoena as they have fought off other efforts to disclose anonymous identities in the recent past. Other litigants in California have won their right to anonymously post negative job reviews but the law remains hotly contested.


Effects on online communities

The conditions for
deindividuation Deindividuation is a concept in social psychology that is generally thought of as the loss of self-awareness in groups, although this is a matter of contention (see below). For the social psychologist, the level of analysis is the individual in ...
, such as "anonymity, reduced
self-awareness In philosophy of self, self-awareness is the experience of one's own personality or individuality. It is not to be confused with consciousness in the sense of qualia. While consciousness is being aware of one's environment and body and life ...
, and reduced self-regulation," fosters creations of online communities much in the same way that they might be employed offline. This is evident in proliferation of communities such as
Reddit Reddit (; stylized in all lowercase as reddit) is an American social news news aggregator, aggregation, Review site#Rating site, content rating, and Internet forum, discussion website. Registered users (commonly referred to as "Redditors") subm ...
or
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
which utilize total anonymity or pseudonymity, or tools such as
Informers An informant (also called an informer or, as a slang term, a “snitch”) is a person who provides privileged information about a person or organization to an agency. The term is usually used within the law-enforcement world, where informan ...
(which add anonymity to non anonymous social media like
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin ...
or
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
), to provide its users the ability to post varied content. The effect of
disinhibition In psychology, disinhibition is a lack of restraint manifested in disregard of social conventions, impulsivity, and poor risk assessment. Disinhibition affects motor, instinctual, emotional, cognitive, and perceptual aspects with signs and sympto ...
has been seen to be beneficial in "advice and discussion
threads Thread may refer to: Objects * Thread (yarn), a kind of thin yarn used for sewing ** Thread (unit of measurement), a cotton yarn measure * Screw thread, a helical ridge on a cylindrical fastener Arts and entertainment * ''Thread'' (film), 2016 ...
by providing a cover for more intimate and open conversations". The "ephemerality", or short-lived nature, of posts that exist on some anonymous image boards such as
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
create a fast-paced environment. As of 2009, threads on 4chan had a median lifespan of 3.9 minutes. There is also research suggesting that content that gets posted in such communities also tends to be more deviant in nature than would be otherwise. The ability to post anonymously has also been linked to the proliferation of
pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
in newsgroups and other online forums wherein users utilize sophisticated mechanisms such as mentioned in
technology Technology is the application of knowledge to reach practical goals in a specifiable and reproducible way. The word ''technology'' may also mean the product of such an endeavor. The use of technology is widely prevalent in medicine, scie ...
.


See also

*
Anonymous social media Anonymous social media is a subcategory of social media wherein the main social function is to share and interact around content and information anonymously on mobile and web-based platforms. Another key aspect of anonymous social media is that cont ...
* ''
Anonymous Online Speakers v. United States District Court for the District of Nevada ''Anonymous Online Speakers v. United States District Court for the District of Nevada'' (In re Anonymous Online Speakers), 611 F.3d 653 (2010), is a decision by the Ninth Circuit lowering the standard a plaintiff must meet to compel identificati ...
'', ( In re Anonymous Online Speakers), 611 F.3d 653 (2010) * '' McIntyre v. Ohio Elections Commission'', 514 U.S. 334 (1995) *
John Doe John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used when the true name of a person is unknown or is being intentionally concealed. In the context of law enforcement in the United States, such names are ofte ...


References

{{Reflist, 30em


External links


"Privacy for People Who Don't Show Their Navels"
Anonymity Internet culture