Skip to content
Surf Wiki
Save to docs
general/anonymity

From Surf Wiki (app.surf) — the open knowledge base

Anonymous post

Method of communication


Method of communication

thumb|alt=screenshot of 4chan's interface|A anonymous post on [[4chan]]'s [[/b/]] imageborkrkard

An anonymous post, is an entry on a textboard, anonymous bulletin board system, or other discussion forums like Internet forum, without a screen name or more commonly by using a non-identifiable pseudonym. Some online forums such as Slashdot do not allow such posts, requiring users to be registered either under their real name or utilizing a pseudonym. Others like JuicyCampus, AutoAdmit, 2channel, and other Futaba-based imageboards (such as 4chan) thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends.

History of online anonymity

Online anonymity can be traced to Usenet newsgroups in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced. This was primarily used for discussion on newsgroups pertaining to certain sensitive topics. There was also the introduction of anonymous remailers which were capable of stripping away the sender's address from mail packets before sending them to the receiver. Online services which facilitated anonymous posting sprang up around mid-1992, originating with the cypherpunk group.

The precursor to Internet forums like 2channel and 4chan were textboards like Ayashii World and Amezou World that provided the ability for anonymous posts in Japan. These "large-scale anonymous textboards" were inspired by the Usenet culture and were primarily focused on technology, unlike their descendants.

Today, image boards receive tremendous Internet traffic from all parts of the world. In 2011, on 4chan's most popular board, /b/, there were roughly 35,000 threads and 400,000 posts created per day. At that time, that level of content was on par with YouTube. Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites.

Levels of anonymity

Anonymity on the Internet can pertain to both the utilization of pseudonyms or requiring no authentication at all (also called "perfect anonymity") for posting on a website. Online anonymity is also limited by IP addresses. For example, WikiScanner associates anonymous Wikipedia edits with the IP address that made the change and tries to identify the entity that owns the IP address. On other websites, IP addresses may not be publicly available, but they can be obtained from the website administrators only through legal intervention. They might not always be traceable to the poster.

Techniques

Utilizing pseudonyms allow people to post without revealing their real identity. Pseudonyms, however, are still prone to being tracked to the user's IP address. To avoid being tracked to an IP address, it is possible to post via a public computer where the IP address would usually be under the purview of the public workspace such as a coffee shop, and hence cannot be traced to the individual user. Adversarial stylometry can be employed to resist identification by writing style.

Memes

Another way people are posting anonymously online is through the use of memes. One popular meme is the Confession Bear meme. People use Confession Bear to post everything from funny and embarrassing stories to very troubled thoughts.

Technology

There are services described as anonymizers which aim to provide users the ability to post anonymously by hiding their identifying information. Anonymizers are essentially proxy servers which act as an intermediary between the user who wants to post anonymously and the website which logs user information such as IP addresses. The proxy server is the only computer in this network which is aware of the user's information and provides its own information to anonymize the poster. Examples of such anonymizers include Tor and I2P, which employ techniques such as onion and garlic routing (respectively) to provide enhanced encryption to messages that travel through multiple proxy servers.

Applications like PGP utilizing techniques like private-key and public-key encryptions are also utilized by users to post content in Usenet groups and other online forums.

In online communities

Online communities vary with their stances on anonymous postings. Wikipedia allows anonymous editing in most cases, but does not label users, instead identifying them by their IP addresses. Other editors commonly refer to these users with neutral terms such as "anons" or "IPs".

namefagMany online bulletin boards require users to be signed in to write—and, in some cases, even to read—posts. 2channel and other Futaba-based image boards take an opposite stance, encouraging the anonymity, and in the case of English-language Futaba-based websites, calling those who use usernames and tripcodes "namefags" and "tripfags", respectively. As required by law, even communities such as 4chan do require the logging of IP addresses of such anonymous posters. Such data, however, can only be accessed by the particular site administrator.

Slashdot discourages anonymous posting by displaying "Anonymous Coward" as the author of each anonymous post. The mildly derogatory term is meant to chide anonymous contributors into logging in.

Ramifications

Effects on users

The effects of posting online anonymously has been linked to the online disinhibition effect in users whilst been categorized into either benign or toxic disinhibition. Disinhibition can result in misbehavior but can also improve user relationships. It may also result in greater disclosure among Internet users, allowing more emotional closeness and openness in a safe social context.

Anonymous computer communication has also been linked to accentuate self-stereotyping. Although it has been linked to notable effects in gender differences, only when the topic bears similarity and fits with the gender stereotype.

A 2015 study suggested that anonymous news comment sections are more susceptible to uncivil comments, especially those directed at other users. Anonymous news comment section users are also more likely to be impolite by either being sarcastic and casting aspersions.

With regard to a recent hostile subpoena in California, commentators have asked if there will be a "Layfield & Barrett effect" chilling job review posting free speech. On May 2, 2016, through its lawyers, Layfield and Barrett and partner Phil Layfield issued a subpoena on Glassdoor seeking the online identities of former employees who posted extremely critical and negative reviews. Glassdoor executives have stated that they will fight the subpoena as they have fought off other efforts to disclose anonymous identities in the recent past. Other litigants in California have won their right to anonymously post negative job reviews but the law remains hotly contested.

Effects on online communities

The conditions for deindividuation, such as "anonymity, reduced self-awareness, and reduced self-regulation," fosters creations of online communities much in the same way that they might be employed offline. This is evident in proliferation of communities such as Reddit or 4chan which utilize total anonymity or pseudonymity, or tools such as Informers (which add anonymity to non anonymous social media like Facebook or Twitter), to provide its users the ability to post varied content. The effect of disinhibition has been seen to be beneficial in "advice and discussion threads by providing a cover for more intimate and open conversations".Anonymous posting can lower social pressure and self-censorship, allowing users to express honest or controversial opinions more freely. Anonymous posting is used by whistleblowers to share sensitive information without revealing their identity.

The "ephemerality", or short-lived nature, of posts that exist on some anonymous image boards such as 4chan create a fast-paced environment. As of 2009, threads on 4chan had a median lifespan of 3.9 minutes.

There is also research suggesting that content that gets posted in such communities also tends to be more deviant in nature than would be otherwise. The ability to post anonymously has also been linked to the proliferation of pornography in newsgroups and other online forums wherein users utilize sophisticated mechanisms such as mentioned in technology.

References

References

  1. Rigby, Karina, [http://groups.csail.mit.edu/mac/classes/6.805/student-papers/fall95-papers/rigby-anonymity.html "Anonymity on the Internet Must Be Protected"]
  2. [https://archive.today/20130414101236/http://www.bienvenidoainternet.org/wiki/Ayashii_World "Ayashii World"]
  3. Furukawa, Hideki,[http://www.ojr.org/japan/internet/1061505583.php "Q&A With the Founder of Channel 2"] {{webarchive. link. (January 9, 2013 , ''The Online Journalism Review'', August 22, 2008)
  4. [http://ask-leo.com/just_how_do_websites_track_or_monitor_our_activity.html "Just how do websites track or monitor our activity?"]
  5. "A Technical Guide to Anonymous Blogging".
  6. Vickery, Jacqueline Ryan. (January 2, 2014). "The curious case of Confession Bear: the reappropriation of online macro-image memes". Information, Communication & Society.
  7. Confinet Ltd. "[http://www.anonic.org/anonymous-surfing.html Anonymous Surfing]", AnonIC.org, 2004
  8. (April 3, 1997). "Culture of the Internet". Lawrence Eribaum Associates.
  9. [http://www.scio.gov.cn/zxbd/zcfg/201206/t1169111.htm "Internet Information Services (revised draft)"], June 7, 2012
  10. [https://www.reuters.com/article/us-china-internet-idUSBRE8560AM20120607 "China Proposes Strengthening Internet Guidelines"], [[Reuters]], June 7, 2012
  11. [http://supchina.com/2017/08/25/china-ban-anonymous-online-comments-chinas-latest-society-culture-news/ China to ban anonymous online comments – China’s latest society and culture news]
  12. Jillian C. York, "[https://www.eff.org/deeplinks/2012/10/dark-day-philippines-government-passes-cybercrime-act/ A Dark Day for the Philippines as Government Passes Cybercrime Act]", ''[[Electronic Frontier Foundation]]'', October 3, 2012
  13. [https://www.law.cornell.edu/constitution/constitution.billofrights.html#amendmenti First Amendment to the U.S. Constitution]
  14. ''McIntyre v. Ohio Elections Commission'', [https://supct.law.cornell.edu/supct/html/93-986.ZO.html 514 U.S. 334] (1995).
  15. See, e.g., [https://courts.delaware.gov/Opinions/%28azug0gfogzf1wl55keulbk55%29/Download.aspx?ID=67130 ''Doe v. Cahill'', 884 A.2d 451 (Del. 2005)]; [http://caselaw.lp.findlaw.com/data2/californiastatecases/h030767.pdf ''Krinsky v. Doe 6'', 159 Cal. App. 4th 1154 (2008)].
  16. Keith Wagstaff, [https://techland.time.com/2012/05/07/you-are-not-an-ip-address-rules-judge/ "You Are Not an IP Address, Rules Judge"]. ''[[Time (magazine). Time]]''. May 7, 2012.
  17. (29 August 2018). "US Court of Appeals: An IP address isn't enough to identify a pirate".
  18. New York State Senate [http://assembly.state.ny.us/leg/?default_fld=&bn=S06779&term=2011&Summary=Y&Text=Y Bill no. S.6779], March 21, 2012.
  19. Dwight Silverman, "What's Online", ''Houston Chronicle'', July 7, 2000, page 2.
  20. Page, Lewis. "Anonymous hackers' Wikileaks 'infowar'". The Register.
  21. Stephen Shankland, "[http://news.cnet.com/Andover.Net+scoops+up+seminal+Slashdot+site/2100-1001_3-227793.html Andover.Net Scoops Up Seminal Slashdot Site]", CNet News, June 29, 1999. (Stating that the term "Anonymous Coward" was popularized by Slashdot.)
  22. (2003). "Looking through a Window on Open Source Culture". Systèmes d'Information et Management.
  23. Suler, John. (2004). "The Online Disinhibition Effect". CyberPsychology & Behavior.
  24. Ben-Ze'e v, Aaron. (July 2003). "Privacy, emotional closeness, and openness in cyberspace". Computers in Human Behavior.
  25. Postmas. (2002). "Behavior Online: Does Anonymous Computer Communication Reduce Gender Inequality?". Personality and Social Psychology Bulletin.
  26. (2015). "Civility 2.0: a comparative analysis of incivility in online political discussion". Information, Communication & Society.
  27. http://lawandmore.typepad.com/law_and_more/2016/05/anonymous-posting-will-there-be-a-layfield-barrett-effect.html {{Webarchive. link. (2021-02-25 Law and More: Deconstructing What Happens In Law, May 17, 2016, Anonymous Posting - Will there be a Layfield & Barrett Effect?)
  28. http://speechwriting-ghostwriting.typepad.com/speechwriting_ghostwritin/2016/05/glassdoor-will-layfield-barrett-subpoena-scare-off-employees-from-ranting.html {{Webarchive. link. (2016-06-29 Jane Genova, Speechwriter-Ghostwriter Blog, May 16, 2016, "Glassdoor - Will Layfield & Barrett Subpoena Scare Off Employees from Ranting?")
  29. http://www.therecorder.com/id=1202749188614/Glassdoor-Fights-Subpoena-Seeking-Identity-of-Commenter?slreturn=20160422220341 The Recorder, Feb. 8, 2016, "Glassdoor Fights Subpoena Seeking Identity of Commenter"
  30. http://www.dmlp.org/threats/krinsky-v-doe-6 Digital Media Law Project, Krinsky v. Doe, 2008
  31. http://www.lexology.com/library/detail.aspx?g=52db6564-e0f4-42eb-abec-c8f109de42a5 Lexicology.com, March 24, 2016, "Opinions, Everyone's Got One".
  32. Myers, David. (1987). ""Anonymity is Part of the Magic": Individual Manipulation of Computer-Mediated Communication Contexts". Springer.
  33. Bernstein, Michael. (2011). "Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media".
  34. Suler, John. (2009). "The Bad Boys of Cyberspace: Deviant Behavior in a Multimedia Chat Community". CyberPsychology & Behavior.
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Anonymous post — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report