An anonymous post, is an entry on a textboard, anonymous bulletin board system, or other discussion forums like Internet forum, without a screen name or more commonly by using a non-identifiable pseudonym. Some online forums such as Slashdot do not allow such posts, requiring users to be registered either under their real name or utilizing a pseudonym. Others like JuicyCampus, AutoAdmit, 2channel, and other Futaba-based imageboards (such as 4chan) thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends.
Online anonymity can be traced to Usenet newsgroups in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced. This was primarily used for discussion on newsgroups pertaining to certain sensitive topics. There was also the introduction of anonymous remailers which were capable of stripping away the sender's address from mail packets before sending them to the receiver. Online services which facilitated anonymous posting sprang up around mid-1992, originating with the cypherpunk group. [1]
The precursor to Internet forums like 2channel and 4chan were textboards like Ayashii World and Amezou World that provided the ability for anonymous posts in Japan. These "large-scale anonymous textboards" were inspired by the Usenet culture and were primarily focused on technology, unlike their descendants. [2]
Today, image boards receive tremendous Internet traffic from all parts of the world. In 2011, on 4chan's most popular board, /b/, there were roughly 35,000 threads and 400,000 posts created per day. At that time, that level of content was on par with YouTube. Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites. [3]
Anonymity on the Internet can pertain to both the utilization of pseudonyms or requiring no authentication at all (also called "perfect anonymity") for posting on a website. [4] Online anonymity is also limited by IP addresses. For example, WikiScanner associates anonymous Wikipedia edits with the IP address that made the change and tries to identify the entity that owns the IP address. On other websites, IP addresses may not be publicly available, but they can be obtained from the website administrators only through legal intervention. They might not always be traceable to the poster. [5]
Utilizing pseudonyms allow people to post without revealing their real identity. Pseudonyms, however, are still prone to being tracked to the user's IP address. [6] To avoid being tracked to an IP address, it is possible to post via a public computer where the IP address would usually be under the purview of the public workspace such as a coffee shop, and hence cannot be traced to the individual user. [6] Adversarial stylometry can be employed to resist identification by writing style.
Another way people are posting anonymously online is through the use of memes. One popular meme is the Confession Bear meme. People use Confession Bear to post everything from funny and embarrassing stories to very troubled thoughts. [7]
There are services described as anonymizers which aim to provide users the ability to post anonymously by hiding their identifying information. Anonymizers are essentially proxy servers which act as an intermediary between the user who wants to post anonymously and the website which logs user information such as IP addresses. The proxy server is the only computer in this network which is aware of the user's information and provides its own information to anonymize the poster. [8] Examples of such anonymizers include Tor and I2P, which employ techniques such as onion and garlic routing (respectively) to provide enhanced encryption to messages that travel through multiple proxy servers. [6]
Applications like PGP utilizing techniques like private-key and public-key encryptions are also utilized by users to post content in Usenet groups and other online forums. [9]
The revised draft of the Chinese government's "Internet Information Services" [10] proposes that "Internet information service providers, including microblogs, forums, and blogs, that allow users to post information on the Internet should ensure users are registered with their real identities". [11] Starting October 1, 2017, it will require Internet users to identify themselves with their real names to use comments sections on news and social media websites. [12]
The Philippine government passed the Cybercrime Prevention Act on 12 September 2012, which among other things grants the Department of Justice the ability to "block access to 'computer data' that is in violation of the Act; in other words, a website hosting criminally libelous speech could be shut down without a court order". [13]
Under the Defamation Act 2013, in an action against a website operator, on a statement posted on the website, it is a defense to show that it was not the operator who posted the statement on the website. The defense is defeated if it was not possible for the claimant to identify the person who posted the statement.
In the United States, the right to speak anonymously online is protected by the First Amendment and various other laws. These laws restrict the ability of the government and civil litigants to obtain the identity of anonymous speakers. The First Amendment says that "Congress shall make no law ... abridging the freedom of speech, or of the press". [14] This protection has been interpreted by the U.S. Supreme Court to protect the right to speak anonymously offline.
For example, in McIntyre v. Ohio Elections Commission , the Supreme Court overturned an Ohio law banning the distribution of anonymous election pamphlets, claiming that an "author's decision to remain anonymous ... is an aspect of the freedom of speech protected by the First Amendment" and that "anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent", as well as a "shield" against the so-called tyranny of the majority. [15] Various courts have interpreted these offline protections to extend to the online world. [16]
Identifying the author of an anonymous post may require a Doe subpoena. This involves gaining access to the IP address of the poster via the hosting website. The courts can then order an ISP to identify the subscriber to whom it had assigned said IP address. Requests for such data are almost always fruitful, though providers will often effect a finite term of data retention (in accordance with the privacy policy of each—local law may specify a minimum and/or maximum term). The usage of IP addresses has, in recent times, been challenged as a legitimate way to identify anonymous users. [17] [18]
On March 21, 2012, the New York State Senate introduced the bill numbered S.6779 (and A.8668) labeled as the "Internet Protection Act". It proposes the ability of a website administrator of a New York–based website to take down anonymous comments unless the original author of the comment agrees to identify themselves on the post. [19]
Online communities vary with their stances on anonymous postings. Wikipedia allows anonymous editing in most cases, but does not label users, instead identifying them by their IP addresses. Other editors commonly refer to these users with neutral terms such as "anons" or "IPs". [20]
Many online bulletin boards require users to be signed in to write—and, in some cases, even to read—posts. 2channel and other Futaba-based image boards take an opposite stance, encouraging the anonymity, and in the case of English-language Futaba-based websites, calling those who use usernames and tripcodes "namefags" and "richeys", respectively. [21] As required by law, even communities such as 4chan do require the logging of IP addresses of such anonymous posters.[ citation needed ] Such data, however, can only be accessed by the particular site administrator.
Slashdot discourages anonymous posting by displaying "Anonymous Coward" as the author of each anonymous post. The mildly derogatory term is meant to chide anonymous contributors into logging in. [22] [23]
The effects of posting online anonymously has been linked to the online disinhibition effect in users whilst been categorized into either benign or toxic disinhibition. [24] Disinhibition can result in misbehavior but can also improve user relationships. It may also result in greater disclosure among Internet users, allowing more emotional closeness and openness in a safe social context. [25]
Anonymous computer communication has also been linked to accentuate self-stereotyping. [26] Although it has been linked to notable effects in gender differences, only when the topic bears similarity and fits with the gender stereotype. [26]
A 2015 study suggested that anonymous news comment sections are more susceptible to uncivil comments, especially those directed at other users. Anonymous news comment section users are also more likely to be impolite by either being sarcastic and casting aspersions. [27]
With regard to a recent hostile subpoena in California, commentators have asked if there will be a "Layfield & Barrett effect" chilling job review posting free speech. [28] [29] On May 2, 2016, through its lawyers, Layfield and Barrett and partner Phil Layfield issued a subpoena on Glassdoor seeking the online identities of former employees who posted extremely critical and negative reviews. Glassdoor executives have stated that they will fight the subpoena as they have fought off other efforts to disclose anonymous identities in the recent past. [30] Other litigants in California have won their right to anonymously post negative job reviews but the law remains hotly contested. [31] [32]
The conditions for deindividuation, such as "anonymity, reduced self-awareness, and reduced self-regulation," fosters creations of online communities much in the same way that they might be employed offline. [33] This is evident in proliferation of communities such as Reddit or 4chan which utilize total anonymity or pseudonymity, or tools such as Informers (which add anonymity to non anonymous social media like Facebook or Twitter), to provide its users the ability to post varied content. The effect of disinhibition has been seen to be beneficial in "advice and discussion threads by providing a cover for more intimate and open conversations". [3]
The "ephemerality", or short-lived nature, of posts that exist on some anonymous image boards such as 4chan create a fast-paced environment. As of 2009, threads on 4chan had a median lifespan of 3.9 minutes. [3]
There is also research suggesting that content that gets posted in such communities also tends to be more deviant in nature than would be otherwise. [34] The ability to post anonymously has also been linked to the proliferation of pornography in newsgroups and other online forums wherein users utilize sophisticated mechanisms such as mentioned in technology. [9]
In slang, a troll is a person who posts deliberately offensive or provocative messages online or who performs similar behaviors in real life. The methods and motivations of trolls can range from benign to sadistic. These messages can be inflammatory, insincere, digressive, extraneous, or off-topic, and may have the intent of provoking others into displaying emotional responses, or manipulating others' perception, thus acting as a bully or a provocateur. The behavior is typically for the troll's amusement, or to achieve a specific result such as disrupting a rival's online activities or purposefully causing confusion or harm to other people.
A pseudonym or alias is a fictitious name that a person assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individual's own. Many pseudonym holders use them because they wish to remain anonymous, but anonymity is difficult to achieve and often fraught with legal issues.
An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anonymous remailers, and nym servers, among others, which differ in how they work, in the policies they adopt, and in the type of attack on the anonymity of e-mail they can resist. Remailing as discussed in this article applies to e-mails intended for particular recipients, not the general public. Anonymity in the latter case is more easily addressed by using any of several methods of anonymous publication.
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and performance in the process.
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques.
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.
An open proxy is a type of proxy server that is accessible by any Internet user.
Anonymizer, Inc. is an Internet privacy company, founded in 1995 by Lance Cottrell, author of the Mixmaster anonymous remailer. Anonymizer was originally named Infonex Internet. The name was changed to Anonymizer in 1997 when the company acquired a web based privacy proxy of the same name developed by Justin Boyan at Carnegie Mellon University School of Computer Science. Boyan licensed the software to C2Net for public beta testing before selling it to Infonex. One of the first web privacy companies founded, Anonymizer creates a VPN link between its servers and its users computer, creating a random IP address, rather than the one actually being used. This can be used to anonymously report a crime, avoid spam, avoid Internet censorship, keep the users identity safe and track competitors, among other uses.
4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from video games and television to literature, cooking, weapons, music, history, anime, fitness, politics, and sports, among others. Registration is not available and users typically post anonymously. As of 2022, 4chan receives more than 22 million unique monthly visitors, of which approximately half are from the United States.
An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header.
A Doe subpoena is a subpoena that seeks the identity of an unknown defendant to a lawsuit. Most jurisdictions permit a plaintiff who does not yet know a defendant's identity to file suit against John Doe and then use the tools of the discovery process to seek the defendant's true name. A Doe subpoena is often served on an online service provider or ISP for the purpose of identifying the author of an anonymous post.
Doe v. 2themart.com Inc., 140 F. Supp. 2d 1088 (2001), was a federal case decided by United States District Court for the Western District of Washington, on the issue of an individual's First Amendment right to speak anonymously on the Internet and a private party's right to disclose the identity of the anonymous Internet user by enforcing a civil subpoena. The court held that 2TheMart.com (TMRT) failed to show that the identities of these anonymous Internet users were directly and materially relevant to the core defense in the litigation, and thus the subpoena should not be issued. Therefore, Doe's motion to quash the subpoena was granted.
Doe v. Cahill, 884 A.2d 451, is a significant case in the realm of anonymous internet speech and the First Amendment. While similar issues had been tackled involving criticism of a publicly traded company, the case marks the first time the Delaware Supreme Court addressed the issue of anonymous internet speech and defamation "in the context of a case involving political criticism of a public figure."
A textboard is a simple kind of Internet forum; most textboards require neither registration nor entry of a screen name. Textboards, like imageboards, were invented in Japan, but they remain relatively unknown outside it, in contrast to imageboards.
Krinsky v. Doe 6, was a decision by the California Court of Appeal, Sixth District, addressing the evidentiary standard required of plaintiffs seeking the identification of anonymous Internet posters. The case addressed defamation and the right to anonymous speech on the Internet. Plaintiff Lisa Krinsky sued Doe 6, an anonymous poster to Yahoo! message boards, for defamation. Krinsky served a subpoena to Yahoo! for Doe 6's identity. Doe 6 filed a motion to quash the subpoena, "contending that he had a First Amendment right to speak anonymously on the Internet."
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a pseudonym, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer, a government, or another group.
Hard Drive Productions, Inc. v. Does 1–1,495, Civil Action No. 11-1741 (JDB/JMF), was a United States District Court for the District of Columbia case in which the court held that anonymous users of the peer-to-peer file sharing service BitTorrent could not remain anonymous after charges of copyright infringement were brought against them. The court ultimately dismissed the case, but the identities of defendants were publicly exposed.
Anonymous social media is a subcategory of social media wherein the main social function is to share and interact around content and information anonymously on mobile and web-based platforms. Another key aspect of anonymous social media is that content or information posted is not connected with particular online identities or profiles.
Data re-identification or de-anonymization is the practice of matching anonymous data with publicly available information, or auxiliary data, in order to discover the person the data belong to. This is a concern because companies with privacy policies, health care providers, and financial institutions may release the data they collect after the data has gone through the de-identification process.
/b/, also called random, is an anonymous imageboard on 4chan. It was the first board created during the establishment of the platform in 2003, and it then stood for "anime/random". While /b/ permits discussion and posting of any sort of content, the community etiquette is to self-limit discussion on /b/ of those topics which are specialties or the focus of other boards on 4chan. /b/ is one of the most popular imageboards on 4chan, next to /pol/. Due to its popularity and notoriety, it overshadows the website with a bad reputation. The Washington Post described /b/ as "an unfathomable grab-bag of the random, the gross and the downright bizarre".