Online anonymity
Online anonymity refers to the ability of individuals to engage in online activities without revealing their identifying information, such as name, location, or personal details. This concept is facilitated by the technological framework of the Internet, allowing users to adopt pseudonyms or utilize tools like proxy servers to mask their identities. While anonymity can foster a sense of freedom and encourage honest dialogue, it has also raised concerns regarding online behavior, enabling activities such as trolling, harassment, and cybercrime.
Historically, anonymity has been seen as a double-edged sword; it can empower marginalized voices and promote political transparency, as seen with organizations like WikiLeaks. However, it has also led to negative implications, including the proliferation of online abuse and fraud. Moreover, societal attitudes towards anonymity vary, with some platforms, such as Facebook, actively discouraging it for accountability, while others embrace it as a norm.
Despite its benefits, complete anonymity is difficult to achieve; sophisticated tracking methods exist, and even seemingly anonymous spaces can reveal identifiable patterns. Legal perspectives on online anonymity are evolving, with organizations like the ACLU advocating for the right to remain anonymous as a critical aspect of free speech, defending individuals against government and corporate attempts to disclose their identities.
On this Page
Subject Terms
Online anonymity
Online anonymity is a phenomenon encouraged by the technological orientation of the Internet, although people take an active role in attempting online anonymity with little tech savvy as well. Anonymity, at its core, means the separation of one’s activities from identifying features such as legal name, location, birth date, and family information. Internet users may employ a range of strategies to achieve anonymity, from using a dummy e-mail address or a fictional social media profile to using proxy servers. There are also various levels of anonymity, ranging from full identification to pseudonym usage, in which a person adopts a name that cannot be linked to their legal identity, to full anonymity.
![Hackers in a room on Open Data Day By Prakash Neupane(Open Data Day) (Own work) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons 90558410-88975.jpg](https://imageserver.ebscohost.com/img/embimages/ers/sp/embedded/90558410-88975.jpg?ephost1=dGJyMNHX8kSepq84xNvgOLCmsE2epq5Srqa4SK6WxWXS)
Background
In 1996, John Perry Barlow typed out the Declaration of the Independence of Cyberspace in a frenzy of utopian sentiment. In it, he described how the anonymity of the Internet permitted a new egalitarianism to emerge beyond the boundaries of race, creed, ethnicity, nationality, gender, and sexual orientation. He thought that people’s contributions would be valued solely on merit. He also predicted the erosion of government power.
However, the anonymity possible in the online world has in reality caused considerable controversy and led to challenges both for individual users and for larger social and political concerns. The masking of identities behind digital avatars or pseudonymous usernames means that users must be aware that others may not be who or what they appear to be. Anonymity leaves many channels open to fraud and other online crimes, the rates of which increased substantially throughout the early twenty-first century. Additionally, the rise of social media in particular was accompanied by instances of bullying and racism enabled by anonymity and the lack of repercussions, as seen in the phenomenon of "trolling," in which users post intentionally offensive, instigating, or irrational messages within an online community in order to generate arguments.
Specific examples of the impact of online anonymity—including instances where assumed anonymity is revealed to be compromised—have often attracted considerable media interest and public controversy. In 2007, a popular World of Warcraft fan video outed characters in the game as “gold farmers,” professional players who make real money from selling virtual goods. Not only did this video out the previously anonymous players, it targeted them with a vitriolic racist discourse because many of them were Chinese. In an even more obviously sociopolitical example, it was revealed that the US National Security Agency (NSA) had access to the online communications of millions of US citizens, as well as to domestic and foreign telephone metadata, sparking concerns that most online activity could in fact be traced back to its source, potentially violating individuals' privacy.
Some contend that the norm on the Internet is anonymity. Others, however, note that most online business and social media require some sort of identity verification. Anonymity is an orientation of the technological features of the Internet; one has to have a fairly high level of expertise to link an IP address with other identifiers such as name and location. However, the values encoded in one layer of the Internet are not necessarily found in others. Thus, though relative anonymity is a feature of the infrastructural layer with regards to transmission protocols, this does not mean it necessarily figures largely in the control software and applications layer. Facebook, for example, strongly discourages anonymity. Arguments against anonymity include the tendency for people to vent socially unacceptable feelings and actions to escape responsibility. A quick visit to the comment sections of news articles is often unpleasant enough to give weight to this argument.
Overview
A study of a news website that transitioned from a comment platform that allowed anonymity to one that did not showed that identified users tended to have their comments liked by others more than anonymous users. Anonymous users tended to use profanity and angry language more often than identified users. The researchers noted that computer-mediated communication in general tends to encourage deindividuation, which means that people are less aware of how their actions are socially situated, which results in less concern about what others think and do.
To be fair, the Internet has resulted in greater political transparency with the emergence and continued activities of groups such as WikiLeaks, which publicizes leaked documents online that expose various wrongdoings of governments and government agencies. WikiLeaks depends upon protecting its suppliers’ anonymity, and it does this technologically with an online, electronic drop-box that has so far proved difficult to trace. The flow of information between those who hold political power and the governed has traditionally been tilted in the former’s favor; therefore WikiLeaks needs to protect their informants from prosecution. They also need reliable data storage, which they have found in an underground nuclear bunker. Their organizational headquarters is in Sweden, where the act of revealing journalists’ sources is a criminal offence. With regards to transmission security, WikiLeaks has had to bolster their encryption and has adopted “onion routing,” which scrambles the encoded locations of the sources, destinations, and dates in their Internet traffic. To do this they use the Tor network. However, information weapons of the QUANTUM program have been used by the NSA to reveal the identities and locations of members of this network.
Aside from WikiLeaks and other “hacktivist” groups such as Anonymous, ordinary people also feel the need to secure some degree of anonymity in their online activities. The reasons for this include fear of judgment from family and friends; fear of discovery by an abusive ex-partner, family member, or any other person an individual has reason to believe would cause them harm if their true identity were revealed; self-protection from prosecution in the case of activities such as illegal downloading; solicitation of honest, uncoerced input and critique of creative works; entertainment and/or practical jokes; and fear of political, social, or workplace persecution. In one study, researchers found that while some people used anonymity to conceal some wrongdoings, they used it just as often to help or support another with no enduring commitments. Contrary to the saying that “honest people should have nothing to hide,” many people seek anonymity because of prior negative experiences.
It should be noted, however, that anonymity is rarely absolute. Even on sites such as 4chan.org, which is credited with originating such popular online memes as LOLcats and where anonymity is assumed as the norm, it is possible to recognize patterns of form and content in the writing, images, and links shared on the site. This is true despite the site culture that sometimes even scorns contributors who use “tripcodes” or pseudonyms. Furthermore, a person would have to be a top-notch hacker in order to evade the identification techniques of a powerful organization such as the NSA.
The American Civil Liberties Union (ACLU) describes "the right to remain anonymous" as "a fundamental component of our right to free speech," which it extends to online anonymity as well. The organization has taken on a number of cases against government and corporate efforts to identify anonymous critics and political dissidents online. In one such case, Sarkar v. Doe, the ACLU represented PubPeer, a website designed to enable anonymous peer review of scientific research without fear of reprisal; in December 2016 the Michigan Court of Appeals upheld a previous judge's ruling that the site cannot be compelled to unmask an anonymous user for making critical comments based on publicly available data, because such comments do not constitute defamation, as the plaintiff in the case had claimed. In another case, the US Department of Homeland Security (DHS) sent a summons to the social media platform Twitter demanding it reveal records regarding the account @ALT‗USCIS, which had been critical of the Donald Trump administration, with a focus on US Citizenship and Immigration Services (USCIS), a department under the DHS. In response, Twitter sued the federal government to block the unmasking, citing the First Amendment right to free speech, and the ACLU assigned lawyers to represent the anonymous user and announced their intent to file on the user's behalf. The DHS immediately withdrew the summons, and in response Twitter voluntarily dismissed its lawsuit. In addition to defending anonymous users against "overbroad or unjustified efforts to unmask" them, the ACLU also "monitor[s] occasional efforts to establish verified online identities" to ensure that any such efforts do not infringe on the right to anonymous speech online.
Bibliography
"Anonymity." Electronic Frontier Foundation, www.eff.org/issues/anonymity. Accessed 3 May 2017.
Bernstein, Michael S., et al. “4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community.” Proceedings of the Fifth International Conference on Weblogs and Social Media, AAAI Press, 2011. Association for the Advancement of Artificial Intelligence, www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2873. Accessed 3 May 2017.
Krotoski, Aleks. “WikiLeaks and the New, Transparent World Order.” Political Quarterly, vol. 82, no. 4, 2011, pp. 526–30. Academic Search Complete, search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=66793319&site=ehost-live. Accessed 3 May 2017.
Marx, Gary T. “What’s in a Name? Some Reflections on the Sociology of Anonymity.” Information Society, vol. 15, no. 2, 1999, pp. 99–112. Academic Search Complete, search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=2030997&site=ehost-live. Accessed 3 May 2017.
McKenna, Katelyn Y. A., and John A. Bargh. “Plan 9 from Cyberspace: The Implications of the Internet for Personality and Social Psychology.” Personality and Social Psychology Review, vol. 4, no. 1, 2000, pp. 57–75. Academic Search Complete, search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=3176644&site=ehost-live. Accessed 3 May 2017.
Morozov, Evgeny. “WikiLeaks’ Relationship with the Media.” Room for Debate, New York Times, 11 Dec. 2010, www.nytimes.com/roomfordebate/2010/12/09/what-has-wikileaks-started/wikileaks-relationship-with-the-media. Accessed 3 May 2017.
North, Anna. "The Double-Edged Sword of Online Anonymity." Taking Note, New York Times, 15 May 2015, takingnote.blogs.nytimes.com/2015/05/15/the-double-edged-sword-of-online-anonymity/. Accessed 3 May 2017.
Omernick, Eli, and Sara Owsley Sood. “The Impact of Anonymity in Online Communities.” 2013 International Conference on Social Computing (SocialCom 2013), IEEE, pp. 526–35.
"Online Anonymity and Identity." American Civil Liberties Union, 10 Apr. 2017, www.aclu.org/issues/free-speech/internet-speech/online-anonymity-and-identity. Accessed 22 May 2017.
Suler, John. “The Online Disinhibition Effect.” CyberPsychology & Behavior, vol. 7, no. 3, 2004, pp. 321–26. Academic Search Complete, search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=13621589&site=ehost-live. Accessed 3 May 2017.
Tufekci, Zeynep. “Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites.” Bulletin of Science, Technology & Society, vol. 28, no. 1, 2008, pp. 20–36, doi:10.1177/0270467607311484. Accessed 3 May 2017.
Zajácz, Rita. “WikiLeaks and the Problem of Anonymity: A Network Control Perspective.” Media, Culture & Society, vol. 35, no. 4, 2013, pp. 487–503, doi:10.1177/016344371348379. Accessed 3 May 2017.