Online anonymity
Online anonymity refers to the ability of individuals to engage in online activities without revealing their identifying information, such as name, location, or personal details. This concept is facilitated by the technological framework of the Internet, allowing users to adopt pseudonyms or utilize tools like proxy servers to mask their identities. While anonymity can foster a sense of freedom and encourage honest dialogue, it has also raised concerns regarding online behavior, enabling activities such as trolling, harassment, and cybercrime.
Historically, anonymity has been seen as a double-edged sword; it can empower marginalized voices and promote political transparency, as seen with organizations like WikiLeaks. However, it has also led to negative implications, including the proliferation of online abuse and fraud. Moreover, societal attitudes towards anonymity vary, with some platforms, such as Facebook, actively discouraging it for accountability, while others embrace it as a norm.
Despite its benefits, complete anonymity is difficult to achieve; sophisticated tracking methods exist, and even seemingly anonymous spaces can reveal identifiable patterns. Legal perspectives on online anonymity are evolving, with organizations like the ACLU advocating for the right to remain anonymous as a critical aspect of free speech, defending individuals against government and corporate attempts to disclose their identities.
Published In: 2021 1 of 3
- Related Topics:
2 of 3
- Related Articles:
3 of 3
Full Article
Online anonymity is a phenomenon encouraged by the technological orientation of the Internet, although people take an active role in attempting online anonymity with little tech savvy as well. Anonymity, at its core, means the separation of one’s activities from identifying features such as legal name, location, birth date, and family information. Internet users may employ a range of strategies to achieve anonymity, from using a dummy email address or a fictional social media profile to using proxy servers. There are also various levels of anonymity, ranging from full identification to pseudonym usage, in which a person adopts a name that cannot be linked to their legal identity, to full anonymity.
Background
In 1996, John Perry Barlow typed out the Declaration of the Independence of Cyberspace in a frenzy of utopian sentiment. In it, he described how the anonymity of the Internet permitted a new egalitarianism to emerge beyond the boundaries of race, creed, ethnicity, nationality, gender, and sexual orientation. He thought that people’s contributions would be valued solely on merit. He also predicted the erosion of government power.
However, the anonymity possible in the online world has, in reality, caused considerable controversy and led to challenges for individual users and larger social and political concerns. The masking of identities behind digital avatars or pseudonymous usernames means that users must be aware that others may not be who or what they appear to be. Anonymity leaves many channels open to fraud and other online crimes, the rates of which increased substantially throughout the early twenty-first century. Additionally, the rise of social media, in particular, was accompanied by instances of bullying and racism enabled by anonymity and the lack of repercussions, as seen in the phenomenon of "trolling," in which users post intentionally offensive, instigating, or irrational messages within an online community to generate arguments.
Specific examples of the impact of online anonymity—including instances where assumed anonymity is revealed to be compromised—have often attracted considerable media interest and public controversy. In 2007, a popular World of Warcraft fan video outed characters in the game as “gold farmers,” professional players who make real money from selling virtual goods. Not only did this video out the previously anonymous players, it targeted them with a vitriolic racist discourse because many of them were Chinese. In an even more obviously sociopolitical example, it was revealed that the US National Security Agency (NSA) had access to the online communications of millions of US citizens, as well as to domestic and foreign telephone metadata, sparking concerns that most online activity could be traced back to its source, potentially violating individuals' privacy.
Some contend that the norm on the Internet is anonymity. Others, however, note that most online businesses and social media require some sort of identity verification. Anonymity is an orientation of the technological features of the Internet; one has to have a fairly high level of expertise to link an IP address with other identifiers such as name and location. However, the values encoded in one layer of the Internet are not necessarily found in others. Thus, though relative anonymity is a feature of the infrastructural layer with regard to transmission protocols, this does not mean it necessarily figures largely in the control software and applications layer. Facebook, for example, strongly discourages anonymity. Arguments against anonymity include the tendency for people to vent socially unacceptable feelings and actions to escape responsibility. A quick visit to the comment sections of news articles is often unpleasant enough to give weight to this argument.
Overview
A study of a news website that transitioned from a comment platform that allowed anonymity to one that did not showed that identified users tended to have their comments liked by others more than anonymous users. Anonymous users tended to use profanity and angry language more often than identified users. The researchers noted that computer-mediated communication, in general, tends to encourage deindividuation, which means that people are less aware of how their actions are socially situated, which results in less concern about what others think and do.
To be fair, the Internet has resulted in greater political transparency with the emergence and continued activities of groups such as WikiLeaks, which publicizes leaked documents online that expose various wrongdoings of governments and government agencies. WikiLeaks depends upon protecting its suppliers’ anonymity, and it does this technologically with a difficult-to-trace drop-box and other advanced cryptographic technologies. The flow of information between those who hold political power and the governed has traditionally been tilted in the former’s favor; therefore, WikiLeaks needs to protect their informants from prosecution. They also need reliable data storage, which they have found in an underground nuclear bunker. Their organizational headquarters is in Sweden, where the act of revealing journalists’ sources is a criminal offense. With regard to transmission security, WikiLeaks bolsters its encryption using “onion routing,” which scrambles the encoded locations of the sources, destinations, and dates in their Internet traffic. To do this, they use the Tor network. However, information weapons of the QUANTUM program have been used by the NSA to reveal the identities and locations of members of this network.
Aside from WikiLeaks and other “hacktivist” groups such as Anonymous, ordinary people also feel the need to secure some degree of anonymity in their online activities. The reasons for this include fear of judgment from family and friends; fear of discovery by an abusive ex-partner, family member, or any other person an individual has reason to believe would cause them harm if their true identity were revealed; self-protection from prosecution in the case of activities such as illegal downloading; solicitation of honest, uncoerced input and critique of creative works; entertainment and/or practical jokes; and fear of political, social, or workplace persecution. In one study, researchers found that while some people used anonymity to conceal some wrongdoings, they used it just as often to help or support another with no enduring commitments. Contrary to the saying that “honest people should have nothing to hide,” many people seek anonymity because of prior negative experiences.
It should be noted, however, that anonymity is rarely absolute. Even on sites such as 4chan.org, which is credited with originating such popular online memes as LOLcats and where anonymity is assumed as the norm, it is possible to recognize patterns of form and content in the writing, images, and links shared on the site. This is true despite the site culture that sometimes even scorns contributors who use “tripcodes” or pseudonyms. Furthermore, a person would have to be a top-notch hacker to evade the identification techniques of a powerful organization such as the NSA.
The American Civil Liberties Union (ACLU) has described "the right to remain anonymous" as "a fundamental component of our right to free speech," which it extends to online anonymity. The organization has taken on a number of cases against government and corporate efforts to identify anonymous critics and political dissidents online. In one such case, Sarkar v. Doe, the ACLU represented PubPeer, a website designed to enable anonymous peer review of scientific research without fear of reprisal; in December 2016, the Michigan Court of Appeals upheld a previous judge's ruling that the site cannot be compelled to unmask an anonymous user for making critical comments based on publicly available data, because such comments do not constitute defamation, as the plaintiff in the case had claimed. In another case, the US Department of Homeland Security (DHS) sent a summons to the social media platform Twitter (now X) demanding it reveal records regarding the account @ALT_USCIS, which had been critical of the Donald Trump administration, with a focus on US Citizenship and Immigration Services (USCIS), a department under the DHS. In response, Twitter sued the federal government to block the unmasking, citing the First Amendment right to free speech, and the ACLU assigned lawyers to represent the anonymous user and announced their intent to file on the user's behalf. The DHS immediately withdrew the summons, and in response, Twitter voluntarily dismissed its lawsuit. In addition to defending anonymous users against "overbroad or unjustified efforts to unmask" them, the ACLU also "monitor[s] occasional efforts to establish verified online identities" to ensure that any such efforts do not infringe on the right to anonymous speech online.
As technology evolves, online anonymity's positive and negative impacts also shift. AI-generated deepfake videos have become more sophisticated, and using pseudonyms or faceless online identities gives influencers a more interactive online anonymity experience. Some critics use these examples to support their argument that online anonymity should be decreased. However, many proponents argue that anonymity is essential and that modern technology can mitigate many drawbacks. For example, machine learning integrated into online platforms can detect and debunk false claims in real time, limiting misinformation. Political discussions have considered limiting anonymity for high-risk accounts and putting requirements in place to protect children online. However, finding the balance between privacy and accountability is a contentious issue of free speech.
Bibliography
"Anonymity." Electronic Frontier Foundation, www.eff.org/issues/anonymity. Accessed 1 Mar. 2025.
Bernstein, Michael S., et al. “4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community.” Proceedings of the Fifth International Conference on Weblogs and Social Media, AAAI Press, 2011. Association for the Advancement of Artificial Intelligence, www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2873. Accessed 1 Mar. 2025.
Krotoski, Aleks. “Wikileaks and the New, Transparent World Order.” Political Quarterly, vol. 82, no. 4, Oct. 2011, pp. 526–30, EBSCOhost, doi:10.1111/j.1467-923X.2011.02250.x. Accessed 1 Mar. 2025.
Marx, Gary T. “What’s in a Name? Some Reflections on the Sociology of Anonymity.” Information Society, vol. 15, no. 2, Apr. 1999, pp. 99–112, EBSCOhost, doi:10.1080/019722499128565. Accessed 1 Mar. 2025.
McKenna, Katelyn Y. A., and John A. Bargh. “Plan 9 from Cyberspace: The Implications of the Internet for Personality and Social Psychology.” Personality & Social Psychology Review (Lawrence Erlbaum Associates), vol. 4, no. 1, Jan. 2000, pp. 57–75, EBSCOhost, doi:10.1207/S15327957PSPR0401_6. Accessed 1 Mar. 2025.
North, Anna. "The Double-Edged Sword of Online Anonymity." Taking Note, New York Times, 15 May 2015, takingnote.blogs.nytimes.com/2015/05/15/the-double-edged-sword-of-online-anonymity. Accessed 1 Mar. 2025.
"Online Anonymity and Identity." American Civil Liberties Union, www.aclu.org/issues/free-speech/internet-speech/online-anonymity-and-identity. Accessed 1 Mar. 2025.
Rigot, Afsaneh. "Why Online Anonymity Matters." The Belfer Center for Science and International Affairs, Harvard Kennedy School, 9 Nov. 2021, www.belfercenter.org/publication/why-online-anonymity-matters. Accessed 1 Mar. 2025.
Suler, John. “The Online Disinhibition Effect.” CyberPsychology & Behavior, vol. 7, no. 3, June 2004, pp. 321–26, EBSCOhost, doi:10.1089/1094931041291295. Accessed 1 Mar. 2025.
Travers, Mark. "A Psychologist Explains Why Internet Trolls Thrive on Anonymity." Forbes, 3 Feb. 2024, www.forbes.com/sites/traversmark/2024/02/03/a-psychologist-explains-why-internet-trolls-thrive-on-anonymity. Accessed 1 Mar. 2025.
Tufekci, Zeynep. “Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites.” Bulletin of Science, Technology & Society, vol. 28, no. 1, 2008, pp. 20–36, doi:10.1177/0270467607311484. Accessed 1 Mar. 2025.
Weinstein, Mark. "To Save Our Democracy, We Must Get Rid of Online Anonymity." The Hill, 2 Nov. 2024, thehill.com/opinion/congress-blog/technology/4959447-social-media-id-verification. Accessed 1 Mar. 2025.
Zajácz, Rita. “WikiLeaks and the Problem of Anonymity: A Network Control Perspective.” Media, Culture & Society, vol. 35, no. 4, 2013, pp. 487–503, doi:10.1177/016344371348379. Accessed 1 Mar. 2025.