Anonymous blog

Last updated

An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a pseudonym, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers. [1] Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer (e.g., in whistleblower cases), a government (in countries that monitor or censor online communication), or another group.

Contents

Deanonymizing techniques

Fundamentally, deanonymization can be divided into two categories:

These techniques may be used together. The order of techniques employed typically escalates from the social correlation techniques, which do not require the compliance of any outside authorities (e.g., Internet providers, server providers, etc.), to more technical identification.

Types

Just as a blog can be on any subject, so can an anonymous blog. Most fall into the following major categories:

Recently, anonymous blogging has moved into a more aggressive and active style, with organized crime groups such as the Mafia using anonymous blogs against mayors and local administrators in Italy. [17]

How online identity is determined

IP addresses

An IP address is a unique numerical label assigned to a computer connected to a computer network that uses the Internet Protocol for communication. [18] The most popular implementation of the Internet Protocol would be the Internet (capitalized, to differentiate it from smaller internetworks). Internet Service Providers (ISPs) are allocated chunks of IP addresses by a Regional Internet registry, which they then assign to customers. However, ISPs do not have enough addresses to give the customers their own address. Instead, DHCP is used; a customer's device (typically a modem or router) is assigned an IP address from a pool of available addresses. It keeps that address for a certain amount of time (e.g., two weeks). If the device is still active at the end of the lease, it can renew its connection and keep the same IP address. Otherwise, the IP address is collected and added to the pool to be redistributed. Thus, IP addresses provide regional information (through Regional Internet registries) and, if the ISP has logs, specific customer information. While this does not prove that a specific person was the originator of a blog post (it could have been someone else using that customer's Internet, after all), it provides powerful circumstantial evidence.

Word and character frequency analysis

Character frequency analysis takes advantage of the fact that all individuals have a different vocabulary: if there is a large body of data that can be tied to an individual (for example, a public figure with an official blog), statistical analysis can be applied to both this body of data and an anonymous blog to see how similar they are. In this way, anonymous bloggers can tentatively be deanonymized. [19] This is known as stylometry; adversarial stylometry is the study of techniques for resisting such stylistic identification.

See also

Related Research Articles

<span class="mw-page-title-main">Blog</span> Discussion or informational site published on the internet

A blog is an informational website consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order so that the most recent post appears first, at the top of the web page. Until 2009, blogs were often the work of a single individual, occasionally of a small group, and often covered a single subject or topic. In the 2010s, "multi-author blogs" (MABs) emerged, featuring the writing of multiple authors and sometimes professionally edited. MABs from newspapers, other media outlets, universities, think tanks, advocacy groups, and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into the news media. Blog can also be used as a verb, meaning to maintain or add content to a blog.

<span class="mw-page-title-main">XS4ALL</span>

XS4ALL was an Internet service provider (ISP) in the Netherlands. It was founded in 1993 as an offshoot of the hackers club Hack-Tic by Felipe Rodriquez, Rop Gonggrijp, Paul Jongsma and Cor Bosman, while based in Amsterdam. It was the sixth provider in the Netherlands and the second company to offer Internet access to private individuals. Initially only offering dial-in services via modem and ISDN, it later expanded to offer dial-up access as well as ADSL, VDSL, and fiber-optic (FTTH) services as well as mobile internet. The name is a play on the English pronunciation of access for all.

Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques.

IP address blocking or IP banning is a configuration of a network service that blocks requests from hosts with certain IP addresses. IP address blocking is commonly used to protect against brute force attacks and to prevent access by a disruptive address. It can also be used to restrict access to or from a particular geographic area; for example, syndicating content to a specific region through the use of Internet geolocation.

Blogger is an American online content management system founded in 1999 which enables its users to write blogs with time-stamped entries. Pyra Labs developed it before being acquired by Google in 2003. Google hosts the blogs, which can be accessed through a subdomain of blogspot.com. Blogs can also be accessed from a user-owned custom domain by using DNS facilities to direct a domain to Google's servers. A user can have up to 100 blogs or websites per account.

Various anti-spam techniques are used to prevent email spam.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network usage, troubleshooting network performance, ensuring that data is in the correct format, checking for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these for normal operation, but use of the second header is normally considered to be shallow packet inspection despite this definition.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by email

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probable that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues, and the sheer volume of communication serve to limit surveillance.

Forward-confirmed reverse DNS (FCrDNS), also known as full-circle reverse DNS, double-reverse DNS, or iprev, is a networking parameter configuration in which a given IP address has both forward (name-to-address) and reverse (address-to-name) Domain Name System (DNS) entries that match each other. This is the standard configuration expected by the Internet standards supporting many DNS-reliant protocols. David Barr published an opinion in RFC 1912 (Informational) recommending it as best practice for DNS administrators, but there are no formal requirements for it codified within the DNS standard itself.

<span class="mw-page-title-main">Heather Armstrong</span> American blogger (1975–2023)

Heather Brooke Armstrong was an American blogger and internet personality from Salt Lake City, Utah, who wrote under the pseudonym Dooce. She was best known for her website dooce.com, which peaked at nearly 8.5 million monthly readers in 2004 before declining due to various factors including the rise of social media; she had actively blogged from c. 2001 until her death by suicide in 2023.

<span class="mw-page-title-main">Personal web page</span> Web page created by an individual to contain personal content

Personal web pages are World Wide Web pages created by an individual to contain content of a personal nature rather than content pertaining to a company, organization or institution. Personal web pages are primarily used for informative or entertainment purposes but can also be used for personal career marketing, social networking with other people with shared interests, or as a space for personal expression.

In computer networking, ingress filtering is a technique used to ensure that incoming packets are actually from the networks from which they claim to originate. This can be used as a countermeasure against various spoofing attacks where the attacker's packets contain fake IP addresses. Spoofing is often used in denial-of-service attacks, and mitigating these is a primary application of ingress filtering.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address that is hard-coded on a network interface controller (NIC) cannot be changed. However, many drivers allow the MAC address to be changed. Additionally, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer's identity, for any reason.

An anonymous post, is an entry on a textboard, anonymous bulletin board system, or other discussion forums like Internet forum, without a screen name or more commonly by using a non-identifiable pseudonym. Some online forums such as Slashdot do not allow such posts, requiring users to be registered either under their real name or utilizing a pseudonym. Others like JuicyCampus, AutoAdmit, 2channel, and other Futaba-based imageboards thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends.

The Russian Business Network is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale. It is the originator of MPack and an alleged operator of the now defunct Storm botnet.

Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their personally identifiable information (PII), which is often provided to and handled by services or applications. PETs use techniques to minimize an information system's possession of personal data without losing functionality. Generally speaking, PETs can be categorized as hard and soft privacy technologies.

A Doe subpoena is a subpoena that seeks the identity of an unknown defendant to a lawsuit. Most jurisdictions permit a plaintiff who does not yet know a defendant's identity to file suit against John Doe and then use the tools of the discovery process to seek the defendant's true name. A Doe subpoena is often served on an online service provider or ISP for the purpose of identifying the author of an anonymous post.

Mommyblogs is a term reserved for blogs authored by women that are writing about family and motherhood, a subset of blogs about family-and-homemaking. These accounts of family and motherhood are sometimes anonymous. In other cases, women will achieve a sort of social media or blogger celebrity status through their digital life writing. Mommyblogs are often considered to be a part of the mamasphere. Mommyblogging can take place on traditional blogging platforms as well as in microblogging environments like those of popular social media sites.

References

  1. "Anonymous Blogging with Wordpress & Tor". Global Voices Advocacy. Global Voices Online. Retrieved 19 October 2014.
  2. "How to Blog Safely". Electronic Frontier Foundation. 11 April 2005. Retrieved 19 October 2014.
  3. Sandhya Menon (February 15, 2010). "For the love of change and blogging". Times of Oman.
  4. Schemo, Diana (September 8, 2008). "Wonder wonk unmasked". New York magazine. New York Media.
  5. Chris Elliott (13 June 2011). "Open door: The authentication of anonymous bloggers". The Guardian. Retrieved 2012-06-02.
  6. Wright, Robin (27 October 2016). "The Secret Eye Inside Mosul". The New Yorker. Retrieved 1 November 2016.
  7. "Media, spiritualities and social change". Reference & Research Book News. August 1, 2011.
  8. Charlie Taylor (27 August 2010) "Red Cross blogger reveals identity" Irish Times
  9. "Irish Red Cross: 15 Dec 2010: Dáil debates (KildareStreet.com)". www.kildarestreet.com. Retrieved 2020-12-06.
  10. Flynn, Nancy (October 1, 2006). "Need-to-know basics of workplace blogging". Voice of America, Work & Family Life.
  11. Waters, Darren (July 20, 2005). "Summary about Dooce By BBC". BBC News. Retrieved January 5, 2010.
  12. Joe Garofoli (January 13, 2007). "KSFO radio hosts take on blogger's allegations". The San Francisco Chronicle.
  13. Thomas, Christine (February 5, 2012). "Explore life's conundrums". Honolulu Star.
  14. Sarah Wu/Mrs Q. (October 5, 2011). Fed Up with Lunch: The School Lunch Project . # Chronicle Books. ISBN   978-1452102283.
  15. Abby Lee (5 Mar 2010). Girl With a One Track Mind: Exposed: Further Revelations of a Sex Blogger. Pan. ISBN   978-0330509695.
  16. "THE LATEST WEAPON TO FIGHT EXTRA FLAB - BLOGGING!". Hindustan Times. January 27, 2009.
  17. "Fewer bullets, more blogging". The Sunday Herald. December 4, 2011.
  18. RFC   760, DOD Standard Internet Protocol (January 1980)
  19. Schneier, Bruce. "Identifying People by their Writing Style". Schneier on Security. Retrieved 20 October 2014.