Lentis/Internet Anonymity

Introduction
Internet anonymity is the idea that the identities of users on the Internet are unknown to others. Through the internet, users can take on a completely new identity or assume no identity at all. This anonymity is assumed for legal and illegal purposes. Also, there have been studies documenting how behavior changes when anonymous online. It is important to understand the desire to be anonymous online as well as why behavior changes while online.

Front-end Anonymity
Front-end anonymity means that users are not immediately identifiable to the public. Front-end anonymity allows users to post content and interact with other users without fear of social repercussion. Websites like 4chan function using front-end anonymity. Users do not need a username or password and their data is stored by the website for minimal amounts of time.

Back-end Anonymity
Back-end anonymity provides a higher level of security than front-end anonymity. Users are not identifiable to the public, website administrators, or the authorities. This is either achieved through not storing IP addresses or by running all internet activity through a network of servers that make it difficult to track to origin of the signal. An example of back-end anonymity is Tor.

Psychology of Anonymity
The state of anonymity comes with an awareness that one’s actions will not be met with social consequences, good or bad. This has significant psychological implications, especially in the realm of online activity. Before internet anonymity, the philosopher Plato considered the question of how being anonymous would affect human morality. He evoked the mythical Ring of Gyges, a ring that would make its wearer invisible, in a dialogue between him and his brother Glaucon in Republic. Glaucon posited that morality is a social construction; apart from maintaining one’s reputation of virtue, moral character would cease to exist. Plato held that abusing anonymity enslaved a person to their desires; a man rationally in control himself would act no differently whether he was invisible or not.

Online Disinhibition Effect
Most situations online lack the social stigmas that apply in face-to-face encounters. This may result in a reduction of user restraint known as the Online Disinhibition Effect. Symptoms include benign tendencies, more openness with others, and less guarded emotions. Psychologists agree such users seek an emotional catharsis unavailable to them offline. Potential consequences of online disinhibition include the social phenomena of cyberbullying, trolling, and flaming. John Suler, a psychologist studying online behavior, has identified six primary factors explaining the sometimes drastic difference in online and face-to-face behavior :

Dissociative Anonymity
When a person remains anonymous, it provides a sense of protection and outlet for behaviors that might be considered antisocial or harmful.

Invisibility
Typically, one cannot be seen online. Therefore, the need to concern oneself with appearance and tone of voice is lowered or absent.

Asynchronicity
Online conversations rarely happen in real time. It’s easy for someone to "speak their mind," log off, and never log back in again.

Solipsistic Introjection
Without visual cues, the human brain assigns characteristics and traits to people during online interactions. This allows fantasies to play out in an individual's mind that are not possible in real life.

Dissociative Imagination
Many see cyberspace as a place where society’s “rules” don't apply to them. Some users dissociate their online identity from the offline reality, enabling them to don said persona or shed it simply by logging on or off.

Minimization of Status and Authority
A person's real life status is generally unknown to others. The internet provides a level playing field for all users to voice their thoughts without a social hierarchy.

The Equalization Phenomenon
The Equalization | Phenomenon states that in online interactions, individuals in computer-based communications interact more equally than those in face-to-face interactions. Those who normally receive social favor due to physical characteristics are not given this advantage. Greater anonymity leads to a more pronounced Equalization Phenomenon. This would make online anonymity a desirable form of communication for socially disadvantaged individuals.

Security
One of the primary reasons to be anonymous online is protect one’s personal identity to protect against identity theft and physical harm. Threats of physical harm could result from one’s physical address being release online (also known as doxing). In order to protect against hacking, the “identity” of one’s computer must be protected, specifically its IP address.

Privacy
Another reason to be anonymous online is to protect against information collection and tracking. For example, advertisements on websites often use trackers to collect information on users. One reason for using ad blockers such as Adblock Plus is to avoid tracking from ads (besides simply not seeing them). Ghostery is a browser add-on created to allow the user to see what trackers are active on a site and disable undesirable ones. Another example of information collection is that done by search engines such as Google. DuckDuckGo is a search engine that offers searching without tracking to users.

Fabricated Identity
One reason to be anonymous, or to hide ones true identity, is to take on a different identity. This could be simply for fun, to craft an online persona, or to illegally impersonate someone.

Illegal Activity
Anonymity is desirable for illegal online activity in order to not get caught. Such activities include illegal online gambling, purchasing illegal drugs, piracy, and more.

Online Black Markets
Using anonymous cryptocurrencies, users buy illegal items on the black market. These black market sites are located on anonymous and encrypted networks to hide user activity. This is commonly referred to as the Darknet. Through these black markets, users can buy drugs, weapons, contract killers, and illegal pornography. The anonymity of the whole system increases the difficulty for law enforcement to stop these illegal markets.

Cryptocurrency
Cryptocurrencies are a decentralized form of digital currency. They use cryptography to add new currency to the market. Most cryptocurrencies are anonymous and store no information about the user. Unlike centralized banking, government has no control over cryptocurrencies. Complex algorithms are computed by users to ensure counterfeiting is not possible. They are introduced to the market using a hashing algorithm like SHA-256 or Scrypt. Bitcoin is the most popular cryptocurrency and is the currency of choice for users who want to buy illegal items online.

Tor
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. It offers the user a network through several thousand nodes to obscure network traffic. Then, on top of that, it encrypts the network traffic on the application layer. The Tor network also incorporates hidden services on the network that can not be accessed on the normal internet. These services are where illegal activities are hosted. This network of hidden services is what is commonly referred to as the Darknet. This network can only be accessed by users using a special Tor browser.

The Silk Road
Silk Road was an online black market and the first modern darknet market started in 2011, best known as a platform for selling illegal drugs. It was operated as a Tor hidden service. Users could create an account a view a website that looked as legitimate as eBay or Amazon. In March 2013, there were over 10,000 listings on the sight, 70% of which were drugs and erotica, books, and fake IDs making up the rest. Users could buy the items with bitcoin and get them shipped straight to their door. Being a Tor hidden service where bitcoin is the main currency, the users and their purchases are completely anonymous and hard to trace.

In October 2013, after an FBI sting operation, the website was shut down. Ross Ulbricht, the site's founder, was convicted of eight charges related to Silk Road in U.S. Federal Court in Manhattan and was sentenced to life in prison without possibility of parole. There were estimated to be $15 million in transactions on The Silk Road before it was shut down. A new version, Silk Road 3 Relaunched, has opened in January 2015. It may take an extended period of time to track down the location of this site and shut it down due to its hidden location on the Tor network.

Tinkebell
In 2004, a Dutch artist broke the neck of her dying cat and used the fur to make a handbag. She posted a tutorial, with photos of the finished product, on her blog and sparked outrage from all over the world. She received so many hate mail and death threats from anonymous people, that she began to wonder who wanted her dead. She answered this question by finding the personal information of the authors of many death threats and publishing all of the information in a book titled: Dearest Tinkebell. The book is no longer for sale due to copyright and privacy issues, but the case highlights the fragility of front-end anonymity. Many of the death threats written to Tinkebell anonymously were from “people who appeared quite normal: sweet-looking teenage girls, policeman, housewives, and office workers” who felt empowered to say dangerous things under the “protection” of front-end anonymity.

Anonymous
Anonymous is a loosely organized network of “hacktivists” who operate according to the “principles of truth, justice, and morality”. Anonymous has no formal leadership, so these ‘Principles of Operation’ are entirely subjective. However, there is an official website (link) and a facebook page with over 5.5 million ‘likes’, which indicates rudimentary levels of organized activity. Anonymous was created on 4chan, an epicenter of online anonymity. The website functions on an front-end anonymity platform; users do not need to login and their IP address is stored for a very short time. Administrators have the ability to block people by their IP address if illegal activity occurs, but self-policing is extremely common. The original Anonymous hackers were brought together from this culture and took on their first high-profile case in 2008: Project Chanology. Project Chanology was a protest that aimed to “expel the chruch from the Internet” in response the Church of Scientology’s attempts to delete one of Tom Cruise’s interviews.



Anti-tracking software developers
Edward Snowden’s 2013 exposure of the National Security Agency’s surveillance activities caused the “Snowden Effect,” an increased interest in information security and privacy. Software developers can take advantage of this demand to sell products providing anti-tracking capabilities or services. These can include anti-advertisement tracking such as Adblock Plus, anti-search engine tracking such as DuckDuckGo, and anti-website tracking such as Ghostery. All these examples are free to use, but they make money through various means: Adblock Plus takes contributions from large companies that want to “whitelist” their ads, DuckDuckGo has ads (although subtle and non-tracking), and Ghostery actually has a “support” option that if enabled, allows the extension to sell information to advertisers about what trackers users decide to block.

The Electronic Frontier Foundation
The EFF is the “leading nonprofit organization defending civil liberties in the digital world.” The group seeks to shift the balance of power online towards users through exposing government misconduct, challenging litigation infringing on online rights, and supporting technologies that preserve personal freedoms. Pertaining to online anonymity, the EFF has been involved in numerous court cases since its founding in 1990. One court observation effectively summarizes the organization's perspective, "The free exchange of ideas on the Internet is driven in large part by the ability of Internet users to communicate anonymously." The Electronic Frontier Foundation represents one of a larger group of organized groups defending the right to remain anonymous online. Other such groups include the American Civil Liberties Union and Freenet Project.

Authors: Pen Names
Some authors, who publish their work online, will use a pen name to keep their true identity a secret. They use these pen names for privacy, branding, and avoiding confusions with other authors of the same name. An industry professional may not want to be associated with the blog that they post online. Joanne Rowling, the acclaimed author of the Harry Potter book series, wrote under the pen name J.K. Rowling, because she anticipating that the target audience of young boys might not want to read a book written by a woman. Stephen King used the pen name Richard Bachman because there was a stigma early in his career that the public would only accept one book a year from an author. Although neither of these authors published their books online, it is an example of why an author would want anonymity in any medium.