World Library  
Flag as Inappropriate
Email this Article


Article Id: WHEBN0000053426
Reproduction Date:

Title: Pseudonymity  
Author: World Heritage Encyclopedia
Language: English
Subject: Applications of cryptography, Anonymizer, Clock drift, Outline of cryptography, Online identity
Publisher: World Heritage Encyclopedia


Pseudonymity, a word derived from pseudonym, meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names (that is, legal identities).[1] Most pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve, and is often fraught with legal issues.[2] True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name.[3]


Although the term is most frequently used today with regard to identity and the Internet, the concept of pseudonymity has a long history. In ancient literature it was common to write in the name of a famous person, not for concealment or with any intention of deceit; in the New Testament, the second letter of Peter is probably such. A more modern example is all of The Federalist Papers, which were signed by Publius, a pseudonym representing the trio of James Madison, Alexander Hamilton, and John Jay. The papers were written partially in response to several Anti-Federalist Papers, also written under pseudonyms. As a result of this pseudonymity, historians know that the papers were written by Madison, Hamilton, and Jay, but have not been able to discern with complete accuracy which of the three authored a few of the papers.

Pseudonymity has become an important phenomenon on the Internet and other computer networks. In computer networks, pseudonyms possess varying degrees of anonymity,[4] ranging from highly linkable public pseudonyms (the link between the pseudonym and a human being is publicly known or easy to discover), potentially linkable non-public pseudonyms (the link is known to system operators but is not publicly disclosed), and unlinkable pseudonyms (the link is not known to system operators and cannot be determined).[5] For example, true anonymous remailer enables Internet users to establish unlinkable pseudonyms; those that employ non-public pseudonyms (such as the now-defunct Penet remailer) are called pseudonymous remailers.

The continuum of unlinkability can also be seen, in part, on WorldHeritage. Some registered users make no attempt to disguise their real identities (for example, by placing their real name on their user page). The pseudonym of unregistered users is their IP address, which can, in many cases, easily be linked to them. Other registered users prefer to remain anonymous, and do not disclose identifying information. However, WorldHeritage's server logs may enable system administrators to determine the IP address, and perhaps the true name, of a registered user (see for a list of the conditions under which such a linkage would be attempted). It is possible, in theory, to create an unlinkable WorldHeritage pseudonym by using an Open proxy, a Web server that disguises the user's IP address. However, most open proxy addresses are blocked indefinitely due to the their frequent use by vandals (see ). Additionally, WorldHeritage's public record of a user's interest areas, writing style, and argumentative positions may still establish an identifiable pattern.[6] [7]

System operators (sysops) at sites offering pseudonymity, such as WorldHeritage, are not likely to build unlinkability into their systems, as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors. Law enforcement personnel, fearing an avalanche of illegal behavior are equally unenthusiastic.[8] Still, some users and privacy activists like the American Civil Liberties Union believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft, illegal government surveillance, stalking, and other unwelcome consequences of Internet use (including unintentional disclosures of their personal information, as discussed in the next section). Their views are supported by laws in some nations (such as Canada) that guarantee citizens a right to speak using a pseudonym.[1] This right does not, however, give citizens the right to demand publication of pseudonymous speech on equipment they do not own.

Pseudonymity and confidentiality

Most Web sites that offer pseudonymity retain information about users. These sites are often susceptible to unauthorized intrusions into their non-public database systems. For example, in 2000, a Welsh teenager obtained information about more than 26,000 credit card accounts, including that of Bill Gates.[9] In 2003, VISA and MasterCard announced that intruders obtained information about 5.6 million credit cards.[10] Sites that offer pseudonymity are also vulnerable to confidentiality breaches. In a study of a Web dating service and a pseudonymous remailer, University of Cambridge researchers discovered that the systems used by these Web sites to protect user data could be easily compromised, even if the pseudonymous channel is protected by strong encryption. Typically, the protected pseudonymous channel exists within a broader framework in which multiple vulnerabilities exist.[11] Pseudonym users should bear in mind that, given the current state of Web security engineering, their true names may be revealed at any time.

Pseudonymity and online reputations

Pseudonymity is an important component of the reputation systems found in online auction services (such as eBay), discussion sites (such as Slashdot), and collaborative knowledge development sites (such as WorldHeritage). A pseudonymous user who has acquired a favorable reputation gains the trust of other users. When users believe that they will be rewarded by acquiring a favorable reputation, they are more likely to behave in accordance with the site's policies.[12]

If users can obtain new pseudonymous identities freely or at very low cost, reputation-based systems are vulnerable to whitewashing attacks[13] (also called serial pseudonymity), in which abusive users continuously discard their old identities and acquire new ones in order to escape the consequences of their behavior: "On the Internet, nobody knows that yesterday you were a dog, and therefore should be in the doghouse today."[14] Users of Internet communities who have been banned only to return with new identities are called sock puppets.

The social cost of cheaply discarded pseudonyms is that experienced users lose confidence in new users,[15] and may subject new users to abuse until they establish a good reputation.[14] System operators may need to remind experienced users that most newcomers are well-intentioned (see, for example, ). Concerns have also been expressed about sock puppets exhausting the supply of easily remembered usernames. In addition a recent research paper demonstrated that people behave in a potentially more aggressive manner when using pseudonyms/nicknames(due to the effects of Online disinhibition effect) as opposed to being completely anonymous.[16][17] Proposals have been made to raise the costs of obtaining new identities (for example, by charging a small fee or requiring e-mail confirmation). Others point out that WorldHeritage's success is attributable in large measure to its nearly non-existent initial participation costs.

Legal cases

In October 2013, the European Court of Human Rights ruled in the Delfi AS v. Estonia case that the Estonian news website Delfi was liable for defamatory comments by users in an article. The court stated that the company "should have expected offensive posts, and exercised an extra degree of caution so as to avoid being held liable for damage to an individual’s reputation" and its notice and take down comments moderation system was "insufficient for preventing harm being cause to third parties".[18][19]

See also


  1. ^ May, Timothy C. (1991). The Crypto Anarchist Manifesto .
  2. ^ du Pont, George F. (2001) The Criminalization of True Anonymity in Cyberspace 7 Mich. Telecomm. Tech. L. Rev.
  3. ^ Post, David G. (1996). Pooling Intellectual Capital: Thoughts on Anonymity, Pseudoanonymity, and Limited Liability in Cyberspace. University of Chicago Legal Forum.
  4. ^ Froomkin, A. Michael (1995). "Anonymity and Its Enemies (Article 4)". Journal of Online Law.
  5. ^ Pfitzmann, A., and M. Köhntopp (2000). "Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology". In H. Federrath (ed.), Anonymity (Berlin: Springer-Verlag), pp. 1-9.
  6. ^ Rao, J.R., and P. Rohatgi (2000). "Can Pseudonyms Really Guarantee Privacy?" Proceedings of the 9th USENIX Security Symposium (Denver, Colorado, Aug. 14-17, 2000).
  7. ^ Jasmine Novak, Prabhakar Raghavan and Andrew Tomkins (2004-05-17). "AntiAliasing on the Web".  
  8. ^ Clarke, Roger (1998). "Technological Aspects of Internet Crime Prevention." Paper presented at the Australian Institute for Criminology's Conference on Internet Crime (February 16–17, 1998).
  9. ^ Reuters News Service (2000). "Report: Hackers Had Gates' Credit Card Data" (March 26, 2000).
  10. ^ Katayama, F. (2003) Technology (February 18, 2003)."Hacker accesses 5.6 Million Credit Cards"
  11. ^ Clayton, R.; Danezis, G.; Kuhn, M. (2001). "Real World Patterns of Failure in Anonymity Systems". Lecture Notes in Computer Science. Lecture Notes in Computer Science 2137: 230–244.  
  12. ^ Kollock, P. (1999). "The Production of Trust in Online Markets." In E.J. Lawler, M. Macy, S. Thyne, and H.A. Walker (eds.), Advances in Group Processes (Greenwich, CT: JAI Press).
  13. ^ Feldman, M., S. Papadimitriou, and J. Chuang (2004). "Free-Riding and Whitewashing in Peer-to-Peer Systems." Paper presented at SIGCOMM '04 Workship (Portland, Oregon, Aug. 30-Sept. 3, 2004).
  14. ^ a b Friedman, E.; Resnick, P. (2001). "The Social Cost of Cheap Pseudonyms". Journal of Economics and Management Strategy 10 (2): 173–199.  
  15. ^ Johnson, D.G.; Miller, K. (1998). "Anonymity, Pseudonymity, and Inescapable Identity on the Net". ACM SIGCAS Computers and Society 28 (2): 37–38.  
  16. ^ Tsikerdekis, Michail (2011). "Proceedings of the IADIS International Conference - Interfaces and Human Computer Interaction". Rome, Italy: IADIS - International association for development of the information society. pp. 500–504. 
  17. ^ Tsikerdekis Michail (2012). "The choice of complete anonymity versus pseudonymity for aggression online.". eMinds International Journal on Human-Computer Interaction 2 (8): 35–57. 
  18. ^ European Court strikes serious blow to free speech online - Article 19, 14 October 2013
  19. ^ The threat facing online comments - Financial Times, John Sunyer, 23 May 2014

External links

  • Anonymity Bibliography Excellent bibliography on anonymity and pseudonymity. Includes hyperlinks.
  • Anonymity Network Describes an architecture for anonymous Web browsing.
  • Electronic Frontier Foundation (EFF) Anonymity/Pseudonymity Archive
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.