Pseudonymity
Encyclopedia
Pseudonymity is a word derived from pseudonym
Pseudonym
A pseudonym is a name that a person assumes for a particular purpose and that differs from his or her original orthonym...

, meaning 'false name', and anonymity
Anonymity
Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...

, meaning unknown or undeclared source, describing a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true name
Personal name
A personal name is the proper name identifying an individual person, and today usually comprises a given name bestowed at birth or at a young age plus a surname. It is nearly universal for a human to have a name; except in rare cases, for example feral children growing up in isolation, or infants...

s (that is, legal identities). Most pseudonym holders use pseudonyms because they wish to remain anonymous
Anonymity
Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...

, but anonymity is difficult to achieve, and is often fraught with legal issues. True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name.

Examples

Although the term is most frequently used today with regard to identity and the Internet, the concept of pseudonymity has a long history. For example, all of the Federalist Papers
Federalist Papers
The Federalist Papers are a series of 85 articles or essays promoting the ratification of the United States Constitution. Seventy-seven of the essays were published serially in The Independent Journal and The New York Packet between October 1787 and August 1788...

 were signed by Publius, a pseudonym representing the trio of James Madison
James Madison
James Madison, Jr. was an American statesman and political theorist. He was the fourth President of the United States and is hailed as the “Father of the Constitution” for being the primary author of the United States Constitution and at first an opponent of, and then a key author of the United...

, Alexander Hamilton
Alexander Hamilton
Alexander Hamilton was a Founding Father, soldier, economist, political philosopher, one of America's first constitutional lawyers and the first United States Secretary of the Treasury...

, and John Jay
John Jay
John Jay was an American politician, statesman, revolutionary, diplomat, a Founding Father of the United States, and the first Chief Justice of the United States ....

. The papers were written partially in response to several Anti-Federalist Papers
Anti-Federalist Papers
The Anti-Federalist Papers are a collection of articles, written in opposition to the ratification of the 1787 United States Constitution. Unlike the Federalist Papers written in support of the Constitution, the authors of these articles, mostly operating under pen names, were not engaged in a...

, also written under pseudonyms. As a result of this pseudonymity, historians know that the papers were written by Madison, Hamilton, and Jay, but have not been able to discern which of the three authored certain papers.

Pseudonymity has become an important phenomenon on the Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

 and other computer networks. In computer networks, pseudonyms possess varying degrees of anonymity
Anonymity
Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...

, ranging from highly linkable public pseudonyms (the link between the pseudonym and a human being is publicly known or easy to discover), potentially linkable non-public pseudonyms (the link is known to system operators but is not publicly disclosed), and unlinkable pseudonyms (the link is not known to system operators and cannot be determined). For example, true anonymous remailer
Anonymous remailer
An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from...

 enables Internet users to establish unlinkable pseudonyms; those that employ non-public pseudonyms (such as the now-defunct Penet remailer
Penet remailer
The Penet remailer was a pseudonymous remailer operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. Its initial creation stemmed from an argument in a Finnish newsgroup over whether people should be required to tie their real name to their online communications...

) are called pseudonymous remailer
Pseudonymous remailer
A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a...

s.

The continuum of unlinkability can also be seen, in part, on Wikipedia
Wikipedia
Wikipedia is a free, web-based, collaborative, multilingual encyclopedia project supported by the non-profit Wikimedia Foundation. Its 20 million articles have been written collaboratively by volunteers around the world. Almost all of its articles can be edited by anyone with access to the site,...

. Some registered users make no attempt to disguise their real identities (for example, by placing their real name on their user page). The pseudonym of unregistered users is their IP address
IP address
An Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing...

, which can, in many cases, easily be linked to them. Other registered users prefer to remain anonymous, and do not disclose identifying information. However, Wikipedia's server logs may enable system administrators to determine the IP address, and perhaps the true name, of a registered user (see for a list of the conditions under which such a linkage would be attempted). It is possible, in theory, to create an unlinkable Wikipedia pseudonym by using an Open proxy
Open proxy
An open proxy is a proxy server that is accessible by any Internet user. Generally, a proxy server allows users within a network group to store and forward Internet services such as DNS or web pages to reduce and control the bandwidth used by the group...

, a Web server that disguises the user's IP address
IP address
An Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing...

. However, most open proxy addresses are blocked indefinitely due to the their frequent use by vandals (see ). Additionally, Wikipedia's public record of a user's interest areas, writing style, and argumentative positions may still establish an identifiable pattern.
System operators (sysops) at sites offering pseudonymity, such as Wikipedia, are not likely to build unlinkability into their systems, as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors. Law enforcement personnel, fearing an avalanche of illegal behavior are equally unenthusiastic. Still, some users and privacy activists like the American Civil Liberties Union
American Civil Liberties Union
The American Civil Liberties Union is a U.S. non-profit organization whose stated mission is "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States." It works through litigation, legislation, and...

 believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft, illegal government surveillance, stalking, and other unwelcome consequences of Internet use (including unintentional disclosures of their personal information, as discussed in the next section). Their views are supported by laws in some nations (such as Canada) that guarantee citizens a right to speak using a pseudonym.http://www.eff.org/legal/cases/2TheMart_case/20010420_eff_2themart_pr.html This right does not, however, give citizens the right to demand publication of pseudonymous speech on equipment they do not own.

Pseudonymity and confidentiality

Most Web sites that offer pseudonymity retain information about users. These sites are often susceptible to unauthorized intrusions into their non-public database systems. For example, in 2000, a Welsh teenager obtained information about more than 26,000 credit card accounts, including that of Bill Gates. In 2003, VISA and MasterCard announced that intruders obtained information about 5.6 million credit cards. Sites that offer pseudonymity are also vulnerable to confidentiality breaches. In a study of a Web dating service and a pseudonymous remailer
Pseudonymous remailer
A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a...

, Cambridge University researchers discovered that the systems used by these Web sites to protect user data could be easily compromised, even if the pseudonymous channel is protected by strong encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

. Typically, the protected pseudonymous channel exists within a broader framework in which multiple vulnerabilities exist. Pseudonym users should bear in mind that, given the current state of Web security engineering, their true names may be revealed at any time.

Pseudonymity and online reputations

Pseudonymity is an important component of the reputation
Reputation
Reputation of a social entity is an opinion about that entity, typically a result of social evaluation on a set of criteria...

 systems found in online auction services (such as eBay
EBay
eBay Inc. is an American internet consumer-to-consumer corporation that manages eBay.com, an online auction and shopping website in which people and businesses buy and sell a broad variety of goods and services worldwide...

), discussion sites (such as Slashdot
Slashdot
Slashdot is a technology-related news website owned by Geeknet, Inc. The site, which bills itself as "News for Nerds. Stuff that Matters", features user-submitted and ‑evaluated current affairs news stories about science- and technology-related topics. Each story has a comments section...

), and collaborative knowledge development sites (such as Wikipedia
Wikipedia
Wikipedia is a free, web-based, collaborative, multilingual encyclopedia project supported by the non-profit Wikimedia Foundation. Its 20 million articles have been written collaboratively by volunteers around the world. Almost all of its articles can be edited by anyone with access to the site,...

). A pseudonymous user who has acquired a favorable reputation gains the trust of other users. When users believe that they will be rewarded by acquiring a favorable reputation, they are more likely to behave in accordance with the site's policies.

If users can obtain new pseudonymous identities freely or at very low cost, reputation-based systems are vulnerable to whitewashing attacks (also called serial pseudonymity), in which abusive users continuously discard their old identities and acquire new ones in order to escape the consequences of their behavior: "On the Internet, nobody knows that yesterday you were a dog, and therefore should be in the doghouse today." Users of Internet communities who have been banned only to return with new identities are called sock puppets.

The social cost of cheaply discarded pseudonyms is that experienced users lose confidence in new users, and may subject new users to abuse until they establish a good reputation. System operators may need to remind experienced users that most newcomers are well-intentioned (see, for example). Concerns have also been expressed about sock puppets exhausting the supply of easily remembered usernames. In addition a recent proceedings paper demonstrated on a theoretical level that people might behave in a different and maybe more aggressive manner when using pseudonymous/nicknames(due to the effects of Online disinhibition effect
Online disinhibition effect
In psychology, the online disinhibition effect, also known in popular culture as John Gabriel's Greater Internet Fuckwad Theory , refers to the way people behave on the Internet with less restraint than in real-world situations...

) as opposed to being completely anonymous. Proposals have been made to raise the costs of obtaining new identities (for example, by charging a small fee or requiring e-mail confirmation). Others point out that Wikipedia's success is attributable in large measure to its nearly non-existent initial participation costs.

See also

  • Pseudonymization
    Pseudonymization
    Pseudonymisation is a procedure by which the most identifying fields within a data record are replaced by one or more artificial identifier's. There can be a single pseudonym for a collection of replaced fields or a pseudonym per replaced field. The purpose is to render the data record less...

  • Anonymity
    Anonymity
    Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...

  • Anonymous post
    Anonymous post
    An anonymous post is an entry on a bulletin board system, Internet forum or message board, blog, or other discussion forum without a screen name or more commonly by using a non-identifiable pseudonym....

  • Anonymous remailer
    Anonymous remailer
    An anonymous remailer is a server computer which receives messages with embedded instructions on where to send them next, and which forwards them without revealing where they originally came from...

  • Cipherspace
    Cipherspace
    Cipherspace or cypherspace is the encrypted equivalent to cyberspace. Examples of cipherspaces include Freenet, I2P, Tor, and some anonymous mail-forwarding services....

  • Confidentiality
    Confidentiality
    Confidentiality is an ethical principle associated with several professions . In ethics, and in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to...

  • Digital signature
    Digital signature
    A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit...

  • Data haven
    Data haven
    A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data. Data havens are locations with legal environments that are friendly to the concept of a computer network freely holding data and even protecting its content and associated information...

  • Friend-to-friend
    Friend-to-friend
    A friend-to-friend computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication....

  • Onion routing
    Onion routing
    Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Like someone unpeeling an onion, each onion router removes a layer of encryption to uncover routing instructions, and...

  • Nym server
  • Nymwars
    Nymwars
    Nymwars is the name given to the conflicts over policies mandating that users of internet service identify using real names. They began in July 2011 when the social networking site Google+ began enforcing its real name only policy by suspending the accounts of users it felt were not following the...

  • Penet.fi
  • Pseudonym
    Pseudonym
    A pseudonym is a name that a person assumes for a particular purpose and that differs from his or her original orthonym...

  • Pseudonymous remailer
    Pseudonymous remailer
    A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a...

  • Public key encryption
  • Pseudonymous Bosch
    Pseudonymous Bosch
    Pseudonymous Bosch is the pen name of Raphael Simon, author of the Secret Series children's books. The name plays off that of the artist Hieronymus Bosch, with the first name a combination of the words pseudonym and anonymous. The Secret Series is a pentalogy of novels based on the five senses:...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK