HOME

TheInfoList



OR:

alt=screenshot of 4chan's interface, an anonymous post on 4chan's /b/ imageboard">_b_.html" ;"title="4chan's /b/">4chan's /b/ imageboard An anonymous post, is an entry on a
textboard A textboard is a simple kind of Internet forum; most textboards require neither registration nor entry of a screen name. Textboards, like imageboards, were invented in Japan, but they remain relatively unknown outside it, in contrast to imagebo ...
, anonymous bulletin board system, or other discussion forums like Internet forum, without a User (computing), screen name or more commonly by using a non-identifiable
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym). This also differs from a new name that entirely or legally replaces an individual's o ...
. Some online forums such as
Slashdot ''Slashdot'' (sometimes abbreviated as ''/.'') is a social news website that originally billed itself as "News for Nerds. Stuff that Matters". It features news stories on science, technology, and politics that are submitted and evaluated by site ...
do not allow such posts, requiring users to be registered either under their real name or utilizing a
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym). This also differs from a new name that entirely or legally replaces an individual's o ...
. Others like JuicyCampus, AutoAdmit,
2channel , also known as 2ch, Channel 2, and sometimes retrospectively as 2ch.net, was an anonymous Japanese textboard founded in 1999 by Hiroyuki Nishimura. Described in 2007 as "Japan's most popular online community", the site had a level of influe ...
, and other Futaba-based imageboards (such as 4chan) thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends.


History of online anonymity

Online anonymity can be traced to
Usenet Usenet (), a portmanteau of User's Network, is a worldwide distributed discussion system available on computers. It was developed from the general-purpose UUCP, Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Elli ...
newsgroup A Usenet newsgroup is a repository usually within the Usenet system for messages posted from users in different locations using the Internet. They are not only discussion groups or conversations, but also a repository to publish articles, start ...
s in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced. This was primarily used for discussion on newsgroups pertaining to certain sensitive topics. There was also the introduction of anonymous remailers which were capable of stripping away the sender's address from mail packets before sending them to the receiver. Online services which facilitated anonymous posting sprang up around mid-1992, originating with the cypherpunk group. The precursor to Internet forums like
2channel , also known as 2ch, Channel 2, and sometimes retrospectively as 2ch.net, was an anonymous Japanese textboard founded in 1999 by Hiroyuki Nishimura. Described in 2007 as "Japan's most popular online community", the site had a level of influe ...
and 4chan were
textboard A textboard is a simple kind of Internet forum; most textboards require neither registration nor entry of a screen name. Textboards, like imageboards, were invented in Japan, but they remain relatively unknown outside it, in contrast to imagebo ...
s like Ayashii World and Amezou World that provided the ability for anonymous posts in
Japan Japan is an island country in East Asia. Located in the Pacific Ocean off the northeast coast of the Asia, Asian mainland, it is bordered on the west by the Sea of Japan and extends from the Sea of Okhotsk in the north to the East China Sea ...
. These "large-scale anonymous textboards" were inspired by the Usenet culture and were primarily focused on technology, unlike their descendants. Today, image boards receive tremendous Internet traffic from all parts of the world. In 2011, on 4chan's most popular board, /b/, there were roughly 35,000 threads and 400,000 posts created per day. At that time, that level of content was on par with
YouTube YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
. Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites.


Levels of anonymity

Anonymity on the Internet can pertain to both the utilization of
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym). This also differs from a new name that entirely or legally replaces an individual's o ...
s or requiring no authentication at all (also called "perfect anonymity") for posting on a website. Online anonymity is also limited by
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es. For example, WikiScanner associates anonymous
Wikipedia Wikipedia is a free content, free Online content, online encyclopedia that is written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and the wiki software MediaWiki. Founded by Jimmy Wales and La ...
edits with the IP address that made the change and tries to identify the entity that owns the IP address. On other websites, IP addresses may not be publicly available, but they can be obtained from the website administrators only through legal intervention. They might not always be traceable to the poster.


Techniques

Utilizing
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person assumes for a particular purpose, which differs from their original or true meaning ( orthonym). This also differs from a new name that entirely or legally replaces an individual's o ...
s allow people to post without revealing their real identity. Pseudonyms, however, are still prone to being tracked to the user's
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
. To avoid being tracked to an IP address, it is possible to post via a public computer where the IP address would usually be under the purview of the public workspace such as a coffee shop, and hence cannot be traced to the individual user. Adversarial stylometry can be employed to resist identification by writing style.


Memes

Another way people are posting anonymously online is through the use of
memes A meme (; ) is an idea, behavior, or style that spreads by means of imitation from person to person within a culture and often carries symbolic meaning representing a particular phenomenon or theme. A meme acts as a unit for carrying cultural ...
. One popular meme is the Confession Bear meme. People use Confession Bear to post everything from funny and embarrassing stories to very troubled thoughts.


Technology

There are services described as anonymizers which aim to provide users the ability to post anonymously by hiding their identifying information. Anonymizers are essentially proxy servers which act as an intermediary between the user who wants to post anonymously and the website which logs user information such as IP addresses. The proxy server is the only computer in this network which is aware of the user's information and provides its own information to anonymize the poster. Examples of such anonymizers include Tor and I2P, which employ techniques such as
onion An onion (''Allium cepa'' , from Latin ), also known as the bulb onion or common onion, is a vegetable that is the most widely cultivated species of the genus '' Allium''. The shallot is a botanical variety of the onion which was classifie ...
and garlic routing (respectively) to provide enhanced
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
to messages that travel through multiple proxy servers. Applications like PGP utilizing techniques like private-key and
public-key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
encryptions are also utilized by users to post content in Usenet groups and other online forums.


Legal standards and regulations


China

The revised draft of the Chinese government's "Internet Information Services" proposes that "Internet information service providers, including microblogs, forums, and blogs, that allow users to post information on the Internet should ensure users are registered with their real identities". Starting October 1, 2017, it will require Internet users to identify themselves with their real names to use comments sections on news and social media websites.


The Philippines

The Philippine government passed the Cybercrime Prevention Act on 12 September 2012, which among other things grants the Department of Justice the ability to "block access to 'computer data' that is in violation of the Act; in other words, a website hosting criminally
libel Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
ous speech could be shut down without a court order".


United Kingdom

Under the Defamation Act 2013, in an action against a website operator, on a statement posted on the website, it is a defense to show that it was not the operator who posted the statement on the website. The defense is defeated if it was not possible for the claimant to identify the person who posted the statement.


United States

In the United States, the right to speak anonymously online is protected by the First Amendment and various other laws. These laws restrict the ability of the government and civil litigants to obtain the identity of anonymous speakers. The First Amendment says that "Congress shall make no law ... abridging the freedom of speech, or of the press". This protection has been interpreted by the U.S. Supreme Court to protect the right to speak anonymously offline. For example, in '' McIntyre v. Ohio Elections Commission'', the Supreme Court overturned an Ohio law banning the distribution of anonymous election pamphlets, claiming that an "author's decision to remain anonymous ... is an aspect of the freedom of speech protected by the First Amendment" and that "anonymous
pamphleteer A pamphleteer is a historical term used to describe someone who creates or distributes pamphlets, unbound (therefore inexpensive) booklets intended for wide circulation. Context Pamphlets were used to broadcast the writer's opinions: to articu ...
ing is not a pernicious, fraudulent practice, but an honorable tradition of
advocacy Advocacy is an Action (philosophy), activity by an individual or advocacy group, group that aims to influence decision making, decisions within political, economic, and social institutions. Advocacy includes activities and publications to infl ...
and of
dissent Dissent is an opinion, philosophy or sentiment of non-agreement or opposition to a prevailing idea or policy enforced under the authority of a government, political party or other entity or individual. A dissenting person may be referred to as ...
", as well as a "shield" against the so-called
tyranny of the majority Tyranny of the majority refers to a situation in majority rule where the preferences and interests of the majority dominate the political landscape, potentially sidelining or repressing minority groups and using majority rule to take non-democrat ...
.''McIntyre v. Ohio Elections Commission''
514 U.S. 334
(1995).
Various courts have interpreted these offline protections to extend to the online world. Identifying the author of an anonymous post may require a Doe subpoena. This involves gaining access to the IP address of the poster via the hosting website. The courts can then order an ISP to identify the subscriber to whom it had assigned said IP address. Requests for such data are almost always fruitful, though providers will often effect a finite term of
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The differe ...
(in accordance with the
privacy policy A privacy policy is a statement or legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identify ...
of each—local law may specify a minimum and/or maximum term). The usage of IP addresses has, in recent times, been challenged as a legitimate way to identify anonymous users. On March 21, 2012, the
New York State Senate The New York State Senate is the upper house of the New York State Legislature, while the New York State Assembly is its lower house. Established in 1777 by the Constitution of New York, its members are elected to two-year terms with no term l ...
introduced the bill numbered S.6779 (and A.8668) labeled as the "Internet Protection Act". It proposes the ability of a website administrator of a New York–based website to take down anonymous comments unless the original author of the comment agrees to identify themselves on the post.


In online communities

Online communities vary with their stances on anonymous postings.
Wikipedia Wikipedia is a free content, free Online content, online encyclopedia that is written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and the wiki software MediaWiki. Founded by Jimmy Wales and La ...
allows anonymous editing in most cases, but does not label users, instead identifying them by their
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es. Other editors commonly refer to these users with neutral terms such as "anons" or "IPs". Many online bulletin boards require users to be signed in to write—and, in some cases, even to read—posts.
2channel , also known as 2ch, Channel 2, and sometimes retrospectively as 2ch.net, was an anonymous Japanese textboard founded in 1999 by Hiroyuki Nishimura. Described in 2007 as "Japan's most popular online community", the site had a level of influe ...
and other Futaba-based image boards take an opposite stance, encouraging the anonymity, and in the case of English-language Futaba-based websites, calling those who use
username A user is a person who uses a computer or Computer network, network Service (systems architecture), service. A user often has a user account and is identified to the system by a username (or user name). Some software products provide serv ...
s and tripcodes "namefags" and "tripfags", respectively. As required by law, even communities such as 4chan do require the logging of IP addresses of such anonymous posters. Such data, however, can only be accessed by the particular site administrator.
Slashdot ''Slashdot'' (sometimes abbreviated as ''/.'') is a social news website that originally billed itself as "News for Nerds. Stuff that Matters". It features news stories on science, technology, and politics that are submitted and evaluated by site ...
discourages anonymous posting by displaying "Anonymous Coward" as the author of each anonymous post. The mildly derogatory term is meant to chide anonymous contributors into logging in.


Ramifications


Effects on users

The effects of posting online anonymously has been linked to the online disinhibition effect in users whilst been categorized into either benign or toxic disinhibition. Disinhibition can result in misbehavior but can also improve user relationships. It may also result in greater disclosure among Internet users, allowing more emotional closeness and openness in a safe social context. Anonymous computer communication has also been linked to accentuate self-stereotyping. Although it has been linked to notable effects in gender differences, only when the topic bears similarity and fits with the
gender stereotype A gender role, or sex role, is a social norm deemed appropriate or desirable for individuals based on their gender or sex. Gender roles are usually centered on conceptions of masculinity and femininity. The specifics regarding these gendered ...
. A 2015 study suggested that anonymous news comment sections are more susceptible to uncivil comments, especially those directed at other users. Anonymous news comment section users are also more likely to be impolite by either being sarcastic and casting aspersions. With regard to a recent hostile subpoena in California, commentators have asked if there will be a "Layfield & Barrett effect" chilling job review posting free speech. On May 2, 2016, through its lawyers, Layfield and Barrett and partner Phil Layfield issued a subpoena on Glassdoor seeking the online identities of former employees who posted extremely critical and negative reviews. Glassdoor executives have stated that they will fight the subpoena as they have fought off other efforts to disclose anonymous identities in the recent past. Other litigants in California have won their right to anonymously post negative job reviews but the law remains hotly contested.


Effects on online communities

The conditions for deindividuation, such as "anonymity, reduced
self-awareness In philosophy of self, philosophy, self-awareness is the awareness and reflection of one's own personality or individuality, including traits, feelings, and behaviors. It is not to be confused with consciousness in the sense of qualia. While ...
, and reduced self-regulation," fosters creations of online communities much in the same way that they might be employed offline. This is evident in proliferation of communities such as
Reddit Reddit ( ) is an American Proprietary software, proprietary social news news aggregator, aggregation and Internet forum, forum Social media, social media platform. Registered users (commonly referred to as "redditors") submit content to the ...
or 4chan which utilize total anonymity or pseudonymity, or tools such as Informers (which add anonymity to non anonymous social media like
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
or
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
), to provide its users the ability to post varied content. The effect of disinhibition has been seen to be beneficial in "advice and discussion threads by providing a cover for more intimate and open conversations". The "ephemerality", or short-lived nature, of posts that exist on some anonymous image boards such as 4chan create a fast-paced environment. As of 2009, threads on 4chan had a median lifespan of 3.9 minutes. There is also research suggesting that content that gets posted in such communities also tends to be more deviant in nature than would be otherwise. The ability to post anonymously has also been linked to the proliferation of
pornography Pornography (colloquially called porn or porno) is Sexual suggestiveness, sexually suggestive material, such as a picture, video, text, or audio, intended for sexual arousal. Made for consumption by adults, pornographic depictions have evolv ...
in newsgroups and other online forums wherein users utilize sophisticated mechanisms such as mentioned in
technology Technology is the application of Conceptual model, conceptual knowledge to achieve practical goals, especially in a reproducible way. The word ''technology'' can also mean the products resulting from such efforts, including both tangible too ...
.


See also

*
Anonymous social media Anonymous social media is a subcategory of social media wherein the main social function is to share and interact around content and information anonymously on mobile and web-based platforms. Another key aspect of anonymous social media is that con ...
* '' Anonymous Online Speakers v. United States District Court for the District of Nevada'', (
In re , Latin for , is a term with several different, but related meanings. Legal use In the legal system in the United States, is used to indicate that a judicial proceeding may not have formally designated adverse parties or is otherwise uncontes ...
Anonymous Online Speakers), 611 F.3d 653 (2010) * '' McIntyre v. Ohio Elections Commission'', 514 U.S. 334 (1995) *
John Doe John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used in the British, Canadian, and American legal systems, when the true name of a person is unknown or is being intentionally concealed. In the context of law ...


References

{{Reflist, 30em


External links


"Privacy for People Who Don't Show Their Navels"
Anonymity Internet culture