Anonymous Blogging is an electronic form of annonymous blogging.

Anonymous blogging in contrast to the conventional blogging practise is all about expressing thoughts and opinions without revealing one’s identity. Unlike fake blog, anonymous blogs are written by real people on a stated stand point basis, and hence most are seen as a credible source, even though they may be biased. The purpose of the anonymous blog is to give an alternate or insiders view on a view point, situation, location or organisation, without giving away the identity of the writer.

Anonymous blogs are particualrly popular with women, who make up 55% of all individual bloggers.[1] Thanks to their insider authenticity and transparency, which are important in social networking and blogging, unlike fake blogs, anonymous blogs are not illegal in most countries.[2] But the blog contents are still subject to at least the bloggers own resdient country laws, if not other jurisdictions, and most blogs about medical subjects will break the Hippocratic oath.[3]

Anonymous bloggers begin by setting up fake email addresses for their blog and registering it with a made-up name (pseudonym), just one way to hide the bloggers true identity. But since the reasons of anonymous blogging touched the notion of controversies, anonymous blogging has been facing a lot of technical challenges. Tracing identities is possible through a number of ways and anonymous bloggers are continuously finding new ways to protect the identities. Presently it is not only about choosing a pen name to start a blog, anonymous bloggers have to use a lot of ways to prevent their identities to be traced, what ever they may choose to write about.

Background

Main article: Blogging

Blogging started off as a platform that allowed people to share ideas and opinions with the world. As a result bloggers also got to be famous as the traffic and visibility of their blogs increases with time. This traffic phenomenon lead in 2004 to the creation of John Gabriel's Greater Internet Fuckwad Theory:[4]

Normal Person + Anonimity + Audience = Fuckwad!

As the concept of blogging grew with time so did the reasons and disciplines of blogging. After threats were made to blogger Kathy Sierra, Tim O'Reilly called for the creation of the Blogger's Code of Conduct.[5] The idea of the code was first reported by BBC News, who quoted O'Reilly saying, "I do think we need some code of conduct around what is acceptable behaviour, I would hope that it doesn't come through any kind of regulation it would come through self-regulation."[6] In 2005, O'Reilly, Robert Scoble[7] and others came up with a list of seven proposed ideas.[8][9][10][11][12]

With the rise of Web 2.0, readers have a new fixation: authenticity. More readers want to know that all bloggers are who you the blogger says they are, and for a lot of bloggers that includes using your real name.[13] However, many authentic bloggers still do not want people to know who they are and what they are doing, either because they are too shy or they want to pursue safe ways of blogging. One of the more popular reasons why bloggers choose to be anonymous is because the topic they want to discuss and share their opinions on is of a controversial nature and they want their identities to be hidden. Being part of the blogosphere throws a lot of questions at anonymous bloggers regarding their purpose of blogging but the truth is that the purpose of blogging is now evolving and anonymous blogging is one of the ways to have control over identity protection.

Benefits of Anonymous Blogging

The concept of anonymous blogging is an attraction for a lot of people. People choose to blog for a number of reasons in which lies the benefits of anonymous blogging. The idea to go anonymous can be supported by a number of reasons. It is simply a safe way of communicating with the blog community without fearing what others might think and say. Whatever the topic of the blog, bloggers benefit greatly from hiding their identities like:[13]

Anonymous blogging has been an enchanting and inviting concept for many people who want to adopt blogging as part of their life. The only problem that bloggers are now facing with this concept is being able to protect their identities and getting through the web technicalities that allow a lot of ways to track users.

Forms of anonymous blogging

There are three forms of basic anonymous blogger:[13]

Although anonymous blogging has taken a lot of criticism from professional journalists, the later two forms of anonimity have been used regularly since the origins of the press by various columnists.[15]

Types of anonymous blogs

Much as a blog can be on any subject, any anonymous blog can be on any subject. But most fall into the following major categories:

Recently, anonymous blogging has moved into a more aggresive active style, with crime gangs such as the Mafia using anonymous blogs against mayors and local administrators in Italy.[24]

How Your Online Identity is Tracked

According to many blog experts bloggers cannot have full anonymity because the world of internet can allow knowing someone better than they know themselves in many ways. While surfing through the web a lot of personal information is left on the virtual space that can be accessed without permission and even available for the public to search. Browsers, search engines and social networking sites (like Facebook, Twitter, LinkedIn and MySpace) are the prime sources through which the personal information can be retrieved. However there are tools that pose threat to anonymous blogger’s identity that are used for tracking. This includes the following methods.

Cookies

Cookies are small pieces of data sent from a website and stored in a user's web browser while a user is browsing a website. When the user browses the same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the user's previous activity.[25] Cookies were designed to be a reliable mechanism for websites to remember the state of the website or activity the user had taken in the past. This can include clicking particular buttons, logging in, or a record of which pages were visited by the user even months or years ago. Although cookies cannot carry viruses, and cannot install malware on the host computer;[26] tracking cookies and especially third-party tracking cookies are commonly used as way to compile long-term records of individuals' browsing histories. In itself a major privacy concern that has prompted European and US law makers to take action,[27][28] cookies can be revealed to find out a blogger’s identity if not disabled.

IP Addresses

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[29] An IP address serves two principal functions: host or network interface identification; and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[30] IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6). Due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995,[31] standardized as RFC 2460 in 1998,[32] and its deployment has been ongoing since the mid-2000s. The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities. They hence fully revealing location of the device, making IP addresses are one of the most popular ways to track and reveal identities as well as physical location.

Anonymous bloggers need to take help from a lot of tools to hide their IP addresses from being tracked easily. Typical of the attitude of internet companies, Google will only reveal an IP address identity on being served a valid court order, as they did in 2007 when the anonymous Skanks in NYC blog attacked Liskula Cohen, a 37-year-old who had modeled for Australian Vogue, Georgio Armani and Versace.[33] In August 2009, a Manhattan Supreme Court judge ruled that Cohen was entitled to know the name of the blogger who had authored the blog, ordering Google to release the blogger's name.[34] Cohen then filed a defamation lawsuit against the blogger, revealed as 29-year-old New York Fashion Institute of Technology student Rosemary Port, for $3 million.[35] Port subsequently announced plans to sue Google for $15 million for breach of a fiduciary duty to protect her privacy, but has never filed any papers.[36]

In China, while legislation and court orders do not directly exist, from 2007 a number of Chinese blog service providers signed the so-called "self-discipline" pact. The pact does not force, but rather "encourages" Internet companies to register and store the real names, addresses and other details of their users.[37]

Google Analytics & Reverse ID Lookup

Google Analytics (GA) is used by many bloggers to keep track of the stats of their blogs. But GA is now threatening most bloggers through its Reverse ID Lookup tool which allow tracking what other sites or blogs the blogger maintains. Normally bloggers use the same Google ID to track their page views for every blog or site they maintain. With GA it is only a matter of minutes when a lot of information about the anonymous blogger can be retrieved.

In November 2011, technologist Andy Baio used GA to trackdown an anonymous flamethrower to his self-identified blog in under a minute.[38] Shocked about how easy the task has been, Baio tried the same tactics with 50 random anonymous blogs, finding that 14 use Google Analytics, and 7 share the same ID: "In about 30 minutes of searching, using only Google and eWhois, I was able to discover the identities of seven of the anonymous or pseudonymous bloggers, and in two cases, their employers."[39] Reverse lookups are now being offered by many free analytics services, which can unmask a lot of blog’s IP addresses and domain registrations.

Technical Challenges Faced by Anonymous Bloggers

Mostly identities are revealed because bloggers are not very technically upfront. Anonymous blogging is not restricted to just having unreal names and emails anymore. There are a lot of aspects to consider in order to protect identities from being leaked through any source. For anonymous bloggers to remain totally and genuinely anonymous they must be totally invisible which is impossible. The biggest challenge that anonymous bloggers face is how to create delays in tracking them.

Bloggers have to ensure that there is no direct link to their real identity and the blog they maintain via the sources or tools that they are using to connect to the World Wide Web. This is specially important for the new bloggers who are not familiar with the breaking-in mechanisms of the virtual world. As the technology is evolving the browsers and connections used by users allow a lot of ways to protect privacy. But along with this evolution there are lot of consequences that hinder the conventional use of the web.

Logging in from different IP addresses whenever it is time to post something on the blog is one way of making bloggers invisible. The concept of Onion Routing has gained much publicity being used by Wikileaks to publish government secrets. While this may seem a fruitful idea it also slows down the routing process and at times restricts user from viewing certain web pages. Mainly all the techniques used to protect identities relate to hiding the IP address tracking. The browsers being used are equipped with major security holes that can comprise the online identity security of the bloggers.

Techniques to stay anonymous

Where there may not be a 100% guarantee on the idea of never being discovered, there are number of ways to pursue anonymity. A few steps provide piece of mind from uninvited interference for anonymous bloggers and protecting their identities:[40]

Pre-thoughts/Caveats

  1. The only way to remain anonymous is not to blog at all
  2. Accept that once you start blogging, its only a matter of time before you are discovered our outed. The more precautions that you take, the longer your time will be as an anonymous blogger
  3. It is easier to start anonymous and come out or be revealed, yet almost impossible to start open and go anonymous. If you want to be anonymous, then start a fresh as anonymous

Set-Up

  1. It is important to set up a separate account for every blog maintained
  2. Using a separate email address to register the blog is important. It is also considered a good option to use temporary email addresses for posting to the blog. These emails expire after 24 hours
  3. Anonymous blogging platforms are the most viable options to consider for staying anonymous online
  4. Using a different host for the anonymous blog so that the IP assigned is totally separate from the one being used for real identity
  5. Set up separate social media accounts, such as on Twitter, Facebook, and Paypal
  6. Consider a P.O. Box if you’ll need to send or receive letter correspondence or goods

Your blog

  1. Think about your blogs identity. Once set-up, it is difficult to change without dumping the whole blog and ceasing all activity on it and associated with it
  2. What boundaries do you have, and what are the boundaries for your blog? For instance, what are you okay with sharing, and what is absolutely off limits? In 2002, Dooce.com blogger Heather Armstrong was allegedly fired from her job as a web designer and graphic artist because she had written satirical accounts of her experiences at a dot-com startup on her personal blog, dooce.com.[41]
  3. Never mention others by name on your blog who could identify you. It is best practise to not mention details of friends or family on your blog.
  4. Many anonymous bloggers hence apply the same rules to people mentioned on their blog as to themselves. Although often not referred to even by pseudonyms, most use nouns or generic tags, ie: "Husband" or "He who created them"
  5. Take your guide as: If in doubt, always be genuine.

Operation

  1. Some anonymous bloggers refuse to use home or work computers, only using communal places such as libraries and cyber cafes
  2. Make sure that privacy settings are applied on the browser, and also through the internet service provider to protect the IP address from being tracked
  3. Using the incognito mode on the browser can help maintain firewalls and proxy servers and also deletes the browsing history by disabling cookies
  4. For tools like Google Analytics it is better to have a separate account to track different domains being maintained.[38]
  5. Domain privacy must be ensured as identities can be revealed through domain payments being made online. It is a better idea to use either a free hosting service or pre-paid hosting service in which online payments can be avoided.[38]
  6. Installing Onion routing software for not being able to track easily is essential as it helps in routing web requests through different network tunnels
  7. Avoid used embedded social networking controls in the blog sites like Facebook or Twitter, or the RSS feed.[38]

Risk to employment?=

  1. Does your company have a set of blogging rules? IBM discourages anonymous blogging or covert marketing, while Sun computer urges employees to expose their personalities but warns that "a blog is a public place and you should avoid embarrassing your readers or the company."[42]
  2. Popularity and awards will turn a far greater press and authority spotlight on your blog, and increase the number of investigators looking for your identity. The popular "Night Jack" blog in the UK with regards policing was shutdown in 2008 after a High Court ruling stated that serving Lancashire Police constable Richard Horton had no right to anonimity. He was subsequently disciplined, and left the force.[43]

Life or death?

  1. Is your anonymity a life-or-death situation? Any internet service that you use could be forced to reveal your details under a court order. But your degree of anonymity can be increased, so to mask your IP address when blogging: use shared computers; an anonymous proxy; or Tor; or ideally a mixture of all three. Andy Baio recommends this Guide to Anonymous Blogging with WordPress & Tor from Global Voices Advocacy.[38]
  2. Watch your history. Resources including Whois track the history of domain and nameserver changes permanently, while Archive.org may contain old versions of your blog. Often social media is a giveaway, so don't be the first person to follow your anonymous Twitter account or promote the link.[38]

An Anonymous blogging platforms

As anonymous blogging is on an upsurge various platforms are being introduced that offer protection of identities for the bloggers. Anonyme.com is one such anonymous blogging platform that is catering to this particular need of bloggers. The platform provides guarantee in the privacy and safety of bloggers and their blog post through a safe environment of blogging.

The technique used by Anonyme is encryption to block the tracking of IP addresses. The servers are encrypted which makes it impossible for the outside interferers to intrude into the privacy of bloggers. Bloggers can create accounts at Anonyme without sharing any of their personal information or even email addresses. This is one way of staying purely anonymous and puts the blogger in charge of what to reveal and what to hide. This does not restrict the readers of the blog to post comments on the blog posts. The two way communication between the anonymous blogger and the reader is constant and bloggers can even use their mobile devices to send posts without their IPs getting tracked.

As new ways of staying anonymous are being introduced such anonymous blogging platforms offer a convenient way to communicate specially for new bloggers. Those who are not technology savvy can leverage significantly through platforms like Anonyme.com because there are no technical details involved. Users simply create their anonymous account and start blogging. The platform provides identity security on its own without letting the user worry about how to apply different measures of protection. Anonyme is a considerable option for anonymous bloggers wanting to blog for their own reasons.

See also

References

  1. ^ Watt, Jenn (July 1, 2006). "Blogging Busts Out for Women". Herizons.
  2. ^ Chartered Institute of Public Relations (2009) CIPR Social Media Guidelines (updated January 2009), p.4 - available at http://www.cipr.co.uk/sites/default/files/Social%20Media%20Guidelines.pdf - accessed 09 August 2010.
  3. ^ Peel, Deborah C. (November 15, 2007). "Blogging about patients is never safe or acceptable.(Do physician bloggers compromise patient privacy?". Family Practice News.
  4. ^ "John Gabriel's Greater Internet Fuckwad Theory". penny-arcade.com. Retrieved 2012-06-02.
  5. ^ Tim O'Reilly (2007-03-03). "Call for a Blogger's Code of Conduct". O'Reilly Radar. Retrieved 2007-04-14.
  6. ^ "Call for blogging code of conduct". BBC News. 2007-03-28. Retrieved 2007-04-14.
  7. ^ "Blog death threats spark debate publisher", BBC News, March 27, 2007.
  8. ^ "Draft Blogger's Code of Conduct". Radar.oreilly.com. Retrieved 2011-01-30.
  9. ^ "Blogger's Code of Conduct at Blogging Wikia". Blogging.wikia.com. Retrieved 2011-01-30.
  10. ^ "MilBlogs Rules of Engagement". Yankeesailor.us. 2005-05-20. Retrieved 2011-01-30.
  11. ^ Code of Conduct: Lessons Learned So Far, by Tim O'Reilly
  12. ^ "Blogger Content Policy". Blogger.com. Retrieved 2011-01-30.
  13. ^ a b c d Treacle (7 April 2010). "Anonymous Blogging 101: a Quick and Dirty Primer". problogger.net. ((cite web)): Unknown parameter |accesssdate= ignored (|access-date= suggested) (help)
  14. ^ "About Treacle Tart". TheLingerieAddict.com. Retrieved 2012-06-02.
  15. ^ Hull, Dana (December 1, 2006). "Blogging between the lines". American Journalism Review.
  16. ^ {[cite newspaper|tile=For the love of change and blogging|publisher=Times of Oman|date=February 15, 2010|author=Sandhya Menon))
  17. ^ Schemo, Diana (September 8, 2008). "Wonder wonk unmasked". New Yorker magazine.
  18. ^ Chris Elliott (13 June 2011). "Open door: The authentication of anonymous bloggers". The Guardian. Retrieved 2012-06-02.
  19. ^ Flynn, Nancy (October 1, 2006). "Need-to-know basics of workplace blogging". Voice of America, Work & Family Life. ((cite news)): |access-date= requires |url= (help)
  20. ^ Waters, Darren (July 20, 2005). "Summary about Dooce By BBC". BBC News. Retrieved January 5, 2010.
  21. ^ "definition of "dooced" at the Urban Dictionary".
  22. ^ "Dooce FAQ".
  23. ^ "THE LATEST WEAPON TO FIGHT EXTRA FLAB - BLOGGING!". Hindustan Times. January 27, 2009. ((cite news)): |access-date= requires |url= (help)
  24. ^ "Fewer bullets, more blogging". The Sunday Herald. December 4, 2011. ((cite news)): |access-date= requires |url= (help)
  25. ^ "HTTP State Management Mechanism – Overview". IETF. 2011-04. ((cite web)): Check date values in: |date= (help)
  26. ^ Adam Penenberg. Cookie Monsters. Slate, November 7, 2005. "Cookies are not software. They can't be programmed, can't carry viruses, and can't unleash malware to go wilding through your hard drive."
  27. ^ "New net rules set to make cookies crumble". BBC. 2011-03-08.
  28. ^ "Sen. Rockefeller: Get Ready for a Real Do-Not-Track Bill for Online Advertising". Adage.com. 2011-05-06.
  29. ^ RFC 760, DOD Standard Internet Protocol (January 1980)
  30. ^ RFC 791, Internet Protocol - DARPA Internet Program Protocol Specification (September 1981)
  31. ^ RFC 1883, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden (December 1995)
  32. ^ RFC 2460, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden, The Internet Society (December 1998)
  33. ^ Kim Zetter (August 24, 2009). "'Skanks' Blogger Unmasked by Google Vows to Sue Company". Wird magazine. Retrieved 2012-06-02.
  34. ^ "Vogue model Liskula Cohen wins right to unmask offensive blogger", Times Online, August 19, 2009
  35. ^ Amira, Dan (2009-08-21). "The Two Sides of Accused Model-Skank Liskula Cohen". New York Magazine. ((cite news)): Italic or bold markup not allowed in: |publisher= (help)
  36. ^ James Temple (2009-08-24). ""Skank" blogger to sue Google for $15 million". San Francisco Chronicle.
  37. ^ "SELF-DISCIPLINE' PACT COULD END ANONYMOUS BLOGGING IN CHINA". US Fed News Service. August 28, 2007. ((cite news)): |access-date= requires |url= (help)
  38. ^ a b c d e f Andy Baio (November 15, 2011). "Think You Can Hide, Anonymous Blogger? Two Words: Google Analytics". Wired magazine. Retrieved 2012-06-02.
  39. ^ "Think You Can Hide, Anonymous Blogger? Two Words: Google Analytics". net-security.org. November 15, 2011. Retrieved 2012-06-02.
  40. ^ Nancy Flynn (1 July 2006). Blog Rules: A Business Guide to Managing Policy, Public Relations, and Legal Issues. Amacom. ISBN 0814473555.
  41. ^ Waters, Darren (July 20, 2005). "Summary about Dooce By BBC". BBC News. Retrieved January 5, 2010.
  42. ^ Stacey Burling (October 25, 2005). "Blogs can boost, wreck careers". The Record (Bergen County, NJ). ((cite web)): Missing or empty |url= (help)
  43. ^ "Blogging blow as police 'spy' loses fight for anonymity". Daily Mail. June 17, 2009.