Knowledge (XXG)

Anonymous post

Source 📝

487:
seeking the online identities of former employees who posted extremely critical and negative reviews. Glassdoor executives have stated that they will fight the subpoena as they have fought off other efforts to disclose anonymous identities in the recent past. Other litigants in California have won
286:, forums, and blogs, that allow users to post information on the Internet should ensure users are registered with their real identities". Starting October 1, 2017, it will require Internet users to identify themselves with their real names to use comments sections on news and social media websites. 166:
edits with the IP address that made the change and tries to identify the entity that owns the IP address. On other websites, IP addresses may not be publicly available, but they can be obtained from the website administrators only through legal intervention. They might not always be traceable to the
223:
which act as an intermediary between the user who wants to post anonymously and the website which logs user information such as IP addresses. The proxy server is the only computer in this network which is aware of the user's information and provides its own information to anonymize the poster.
459:
in users whilst been categorized into either benign or toxic disinhibition. Disinhibition can result in misbehavior but can also improve user relationships. It may also result in greater disclosure among Internet users, allowing more emotional closeness and openness in a safe social context.
322:, in an action against a website operator, on a statement posted on the website, it is a defense to show that it was not the operator who posted the statement on the website. The defense is defeated if it was not possible for the claimant to identify the person who posted the statement. 474:
A 2015 study suggested that anonymous news comment sections are more susceptible to uncivil comments, especially those directed at other users. Anonymous news comment section users are also more likely to be impolite by either being sarcastic and casting aspersions.
355:, the Supreme Court overturned an Ohio law banning the distribution of anonymous election pamphlets, claiming that an "author's decision to remain anonymous ... is an aspect of the freedom of speech protected by the First Amendment" and that "anonymous 562: 137:
Today, image boards receive tremendous Internet traffic from all parts of the world. In 2011, on 4chan's most popular board, /b/, there were roughly 35,000 threads and 400,000 posts created per day. At that time, that level of content was on par with
1204: 436:"namefags" and "richeys", respectively. As required by law, even communities such as 4chan do require the logging of IP addresses of such anonymous posters. Such data, however, can only be accessed by the particular site administrator. 105:
in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced. This was primarily used for discussion on newsgroups pertaining to certain sensitive topics. There was also the introduction of
338:. These laws restrict the ability of the government and civil litigants to obtain the identity of anonymous speakers. The First Amendment says that "Congress shall make no law ... abridging the freedom of speech, or of the 538:
There is also research suggesting that content that gets posted in such communities also tends to be more deviant in nature than would be otherwise. The ability to post anonymously has also been linked to the proliferation of
110:
which were capable of stripping away the sender's address from mail packets before sending them to the receiver. Online services which facilitated anonymous posting sprang up around mid-1992, originating with the
478:
With regard to a recent hostile subpoena in California, commentators have asked if there will be a "Layfield & Barrett effect" chilling job review posting free speech. On May 2, 2016, through its lawyers,
1201: 1185: 504:, and reduced self-regulation," fosters creations of online communities much in the same way that they might be employed offline. This is evident in proliferation of communities such as 442:
discourages anonymous posting by displaying "Anonymous Coward" as the author of each anonymous post. The mildly derogatory term is meant to chide anonymous contributors into logging in.
390:
of each—local law may specify a minimum and/or maximum term). The usage of IP addresses has, in recent times, been challenged as a legitimate way to identify anonymous users.
986: 382:
to identify the subscriber to whom it had assigned said IP address. Requests for such data are almost always fruitful, though providers will often effect a finite term of
331: 1220: 1202:
http://speechwriting-ghostwriting.typepad.com/speechwriting_ghostwritin/2016/05/glassdoor-will-layfield-barrett-subpoena-scare-off-employees-from-ranting.html
207:. One popular meme is the Confession Bear meme. People use Confession Bear to post everything from funny and embarrassing stories to very troubled thoughts. 90:) thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends. 428:-based image boards take an opposite stance, encouraging the anonymity, and in the case of English-language Futaba-based websites, calling those who use 339: 1182: 134:. These "large-scale anonymous textboards" were inspired by the Usenet culture and were primarily focused on technology, unlike their descendants. 629: 401:
of a New York–based website to take down anonymous comments unless the original author of the comment agrees to identify themselves on the post.
1211:
Jane Genova, Speechwriter-Ghostwriter Blog, May 16, 2016, "Glassdoor - Will Layfield & Barrett Subpoena Scare Off Employees from Ranting?"
574: 351: 335: 699: 837: 383: 303: 154:
or requiring no authentication at all (also called "perfect anonymity") for posting on a website. Online anonymity is also limited by
951: 724:
Vickery, Jacqueline Ryan (January 2, 2014). "The curious case of Confession Bear: the reappropriation of online macro-image memes".
299: 1192:
Law and More: Deconstructing What Happens In Law, May 17, 2016, Anonymous Posting - Will there be a Layfield & Barrett Effect?
600: 512:
which utilize total anonymity or pseudonymity, or tools such as Informers (which add anonymity to non anonymous social media like
978: 219:
which aim to provide users the ability to post anonymously by hiding their identifying information. Anonymizers are essentially
179:
allow people to post without revealing their real identity. Pseudonyms, however, are still prone to being tracked to the user's
849: 467:. Although it has been linked to notable effects in gender differences, only when the topic bears similarity and fits with the 1257:
Myers, David (1987). ""Anonymity is Part of the Magic": Individual Manipulation of Computer-Mediated Communication Contexts".
662: 306:
the ability to "block access to 'computer data' that is in violation of the Act; in other words, a website hosting criminally
854: 794: 937: 895: 776: 1221:
http://www.therecorder.com/id=1202749188614/Glassdoor-Fights-Subpoena-Seeking-Identity-of-Commenter?slreturn=20160422220341
1008: 611: 397:
introduced the bill numbered S.6779 (and A.8668) labeled as the "Internet Protection Act". It proposes the ability of a
521: 456: 1244: 867: 378:. This involves gaining access to the IP address of the poster via the hosting website. The courts can then order an 1349: 1183:
http://lawandmore.typepad.com/law_and_more/2016/05/anonymous-posting-will-there-be-a-layfield-barrett-effect.html
1113:
Postmas; et al. (2002). "Behavior Online: Does Anonymous Computer Communication Reduce Gender Inequality?".
282:
government's "Internet Information Services" proposes that "Internet information service providers, including
918: 682: 1329: 368: 256: 252: 420:
Many online bulletin boards require users to be signed in to write—and, in some cases, even to read—posts.
821: 556: 543:
in newsgroups and other online forums wherein users utilize sophisticated mechanisms such as mentioned in
480: 192: 394: 39: 902: 637: 1148:
Rowe, I. (2015). "Civility 2.0: a comparative analysis of incivility in online political discussion".
531:
The "ephemerality", or short-lived nature, of posts that exist on some anonymous image boards such as
142:. Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites. 1011:", CNet News, June 29, 1999. (Stating that the term "Anonymous Coward" was popularized by Slashdot.) 535:
create a fast-paced environment. As of 2009, threads on 4chan had a median lifespan of 3.9 minutes.
413:
allows anonymous editing in most cases, but does not label users, instead identifying them by their
1292:
Suler, John (2009). "The Bad Boys of Cyberspace: Deviant Behavior in a Multimedia Chat Community".
525: 319: 248: 107: 1344: 1309: 1274: 1165: 1130: 1065: 741: 343: 259:
encryptions are also utilized by users to post content in Usenet groups and other online forums.
786: 780: 703: 1057: 790: 464: 1301: 1266: 1157: 1122: 1092: 1049: 733: 102: 47: 1083:
Ben-Ze'e v, Aaron (July 2003). "Privacy, emotional closeness, and openness in cyberspace".
417:. Other editors commonly refer to these users with neutral terms such as "anons" or "IPs". 371:. Various courts have interpreted these offline protections to extend to the online world. 1208: 1189: 923: 666: 497: 488:
their right to anonymously post negative job reviews but the law remains hotly contested.
187:
where the IP address would usually be under the purview of the public workspace such as a
184: 882: 809: 501: 425: 387: 237: 79: 43: 1096: 1338: 1278: 1223:
The Recorder, Feb. 8, 2016, "Glassdoor Fights Subpoena Seeking Identity of Commenter"
1134: 745: 233: 225: 204: 130:
like Ayashii World and Amezou World that provided the ability for anonymous posts in
59: 1313: 630:"4chan and/b: An Analysis of Anonymity and Ephemerality in a Large Online Community" 563:
Anonymous Online Speakers v. United States District Court for the District of Nevada
1169: 1069: 659: 375: 268: 220: 1245:
http://www.lexology.com/library/detail.aspx?g=52db6564-e0f4-42eb-abec-c8f109de42a5
634:
Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media
410: 163: 1161: 737: 838:
China to ban anonymous online comments – China’s latest society and culture news
540: 468: 356: 330:
In the United States, the right to speak anonymously online is protected by the
295: 188: 159: 83: 67: 17: 759: 1232: 1126: 414: 241: 216: 180: 155: 112: 1053: 58:
do not allow such posts, requiring users to be registered either under their
484: 398: 283: 176: 151: 127: 71: 63: 51: 35: 1305: 1061: 1021:
Gosain, Sanjay (2003). "Looking through a Window on Open Source Culture".
777:"Chapter 3: Pornography in Cyberspace: An Exploration of What's in Usenet" 520:), to provide its users the ability to post varied content. The effect of 581: 513: 439: 433: 429: 421: 360: 119: 75: 55: 359:
is not a pernicious, fraudulent practice, but an honorable tradition of
203:
Another way people are posting anonymously online is through the use of
183:. To avoid being tracked to an IP address, it is possible to post via a 1270: 825: 517: 364: 139: 938:"US Court of Appeals: An IP address isn't enough to identify a pirate" 505: 99: 463:
Anonymous computer communication has also been linked to accentuate
850:
A Dark Day for the Philippines as Government Passes Cybercrime Act
567: 532: 509: 409:
Online communities vary with their stances on anonymous postings.
307: 279: 131: 123: 87: 455:
The effects of posting online anonymously has been linked to the
150:
Anonymity on the Internet can pertain to both the utilization of
528:
by providing a cover for more intimate and open conversations".
1247:
Lexicology.com, March 24, 2016, "Opinions, Everyone's Got One".
379: 229: 195:
can be employed to resist identification by writing style.
374:
Identifying the author of an anonymous post may require a
302:
on 12 September 2012, which among other things grants the
524:
has been seen to be beneficial in "advice and discussion
244:
to messages that travel through multiple proxy servers.
1040:
Suler, John (2004). "The Online Disinhibition Effect".
683:"Just how do websites track or monitor our activity?" 191:, and hence cannot be traced to the individual user. 775:
Mehta, Michael & Plaza, Dwaine (April 3, 1997).
346:to protect the right to speak anonymously offline. 822:"China Proposes Strengthening Internet Guidelines" 310:speech could be shut down without a court order". 1330:"Privacy for People Who Don't Show Their Navels" 1235:Digital Media Law Project, Krinsky v. Doe, 2008 810:"Internet Information Services (revised draft)" 770: 768: 570:Anonymous Online Speakers), 611 F.3d 653 (2010) 483:and partner Phil Layfield issued a subpoena on 367:", as well as a "shield" against the so-called 342:". This protection has been interpreted by the 601:"Anonymity on the Internet Must Be Protected" 50:or more commonly by using a non-identifiable 8: 1233:http://www.dmlp.org/threats/krinsky-v-doe-6 1009:Andover.Net Scoops Up Seminal Slashdot Site 1115:Personality and Social Psychology Bulletin 1108: 1106: 700:"A Technical Guide to Anonymous Blogging" 1150:Information, Communication & Society 979:"Anonymous hackers' Wikileaks 'infowar'" 919:"You Are Not an IP Address, Rules Judge" 868:First Amendment to the U.S. Constitution 785:. Lawrence Eribaum Associates. pp.  726:Information, Communication & Society 694: 692: 690: 660:"Q&A With the Founder of Channel 2" 592: 118:The precursor to Internet forums like 879:McIntyre v. Ohio Elections Commission 575:McIntyre v. Ohio Elections Commission 352:McIntyre v. Ohio Elections Commission 224:Examples of such anonymizers include 7: 1023:Systèmes d'Information et Management 623: 621: 619: 963:Dwight Silverman, "What's Online", 240:(respectively) to provide enhanced 232:, which employ techniques such as 98:Online anonymity can be traced to 42:, or other discussion forums like 25: 989:from the original on 28 June 2011 215:There are services described as 906:, 159 Cal. App. 4th 1154 (2008) 544: 263:Legal standards and regulations 1294:CyberPsychology & Behavior 1042:CyberPsychology & Behavior 855:Electronic Frontier Foundation 500:, such as "anonymity, reduced 1: 1097:10.1016/s0747-5632(02)00078-x 492:Effects on online communities 54:. Some online forums such as 1162:10.1080/1369118X.2014.940365 738:10.1080/1369118X.2013.871056 671:The Online Journalism Review 1085:Computers in Human Behavior 628:Bernstein, Michael (2011). 457:online disinhibition effect 94:History of online anonymity 1366: 899:, 884 A.2d 451 (Del. 2005) 779:. In Keisler, Sara (ed.). 266: 251:utilizing techniques like 1127:10.1177/01461672022811006 300:Cybercrime Prevention Act 278:The revised draft of the 1265:(3). Springer: 251–266. 1054:10.1089/1094931041291295 665:January 9, 2013, at the 386:(in accordance with the 967:, July 7, 2000, page 2. 782:Culture of the Internet 393:On March 21, 2012, the 369:tyranny of the majority 27:Method of communication 1306:10.1089/cpb.1998.1.275 950:New York State Senate 557:Anonymous social media 298:government passed the 193:Adversarial stylometry 1259:Qualitative Sociology 578:, 514 U.S. 334 (1995) 405:In online communities 399:website administrator 395:New York State Senate 304:Department of Justice 162:associates anonymous 40:bulletin board system 1007:Stephen Shankland, " 481:Layfield and Barrett 762:", AnonIC.org, 2004 496:The conditions for 320:Defamation Act 2013 146:Levels of anonymity 108:anonymous remailers 34:, is an entry on a 1271:10.1007/bf00988989 1207:2016-06-29 at the 1188:2021-02-25 at the 848:Jillian C. York, " 344:U.S. Supreme Court 247:Applications like 965:Houston Chronicle 954:, March 21, 2012. 940:. 29 August 2018. 858:, October 3, 2012 760:Anonymous Surfing 673:, August 22, 2008 658:Furukawa, Hideki, 469:gender stereotype 465:self-stereotyping 16:(Redirected from 1357: 1350:Internet culture 1318: 1317: 1289: 1283: 1282: 1254: 1248: 1242: 1236: 1230: 1224: 1218: 1212: 1199: 1193: 1180: 1174: 1173: 1145: 1139: 1138: 1121:(8): 1073–1083. 1110: 1101: 1100: 1080: 1074: 1073: 1037: 1031: 1030: 1018: 1012: 1005: 999: 998: 996: 994: 974: 968: 961: 955: 948: 942: 941: 934: 928: 917:Keith Wagstaff, 915: 909: 904:Krinsky v. Doe 6 892: 886: 876: 870: 865: 859: 846: 840: 835: 829: 819: 813: 807: 801: 800: 772: 763: 756: 750: 749: 721: 715: 714: 712: 711: 702:. Archived from 696: 685: 680: 674: 656: 650: 649: 647: 645: 636:. Archived from 625: 614: 609: 603: 597: 451:Effects on users 349:For example, in 21: 18:Anonymous Coward 1365: 1364: 1360: 1359: 1358: 1356: 1355: 1354: 1335: 1334: 1326: 1321: 1291: 1290: 1286: 1256: 1255: 1251: 1243: 1239: 1231: 1227: 1219: 1215: 1209:Wayback Machine 1200: 1196: 1190:Wayback Machine 1181: 1177: 1147: 1146: 1142: 1112: 1111: 1104: 1082: 1081: 1077: 1039: 1038: 1034: 1020: 1019: 1015: 1006: 1002: 992: 990: 976: 975: 971: 962: 958: 952:Bill no. S.6779 949: 945: 936: 935: 931: 916: 912: 893: 889: 877: 873: 866: 862: 847: 843: 836: 832: 820: 816: 808: 804: 797: 774: 773: 766: 758:Confinet Ltd. " 757: 753: 723: 722: 718: 709: 707: 698: 697: 688: 681: 677: 667:Wayback Machine 657: 653: 643: 641: 627: 626: 617: 612:"Ayashii World" 610: 606: 599:Rigby, Karina, 598: 594: 590: 553: 498:deindividuation 494: 453: 448: 411:Knowledge (XXG) 407: 332:First Amendment 328: 316: 292: 290:The Philippines 276: 271: 265: 213: 201: 185:public computer 173: 164:Knowledge (XXG) 158:. For example, 148: 96: 62:or utilizing a 28: 23: 22: 15: 12: 11: 5: 1363: 1361: 1353: 1352: 1347: 1337: 1336: 1333: 1332: 1325: 1324:External links 1322: 1320: 1319: 1300:(3): 275–294. 1284: 1249: 1237: 1225: 1213: 1194: 1175: 1156:(2): 121–138. 1140: 1102: 1091:(4): 451–467. 1075: 1048:(3): 321–326. 1032: 1013: 1000: 969: 956: 943: 929: 927:. May 7, 2012. 910: 887: 871: 860: 841: 830: 828:, June 7, 2012 814: 812:, June 7, 2012 802: 795: 764: 751: 732:(3): 301–325. 716: 686: 675: 651: 615: 604: 591: 589: 586: 585: 584: 579: 571: 559: 552: 549: 502:self-awareness 493: 490: 452: 449: 447: 444: 406: 403: 388:privacy policy 384:data retention 357:pamphleteering 327: 324: 315: 314:United Kingdom 312: 291: 288: 275: 272: 267:Main article: 264: 261: 238:garlic routing 212: 209: 200: 197: 172: 169: 147: 144: 95: 92: 66:. Others like 44:Internet forum 32:anonymous post 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1362: 1351: 1348: 1346: 1343: 1342: 1340: 1331: 1328: 1327: 1323: 1315: 1311: 1307: 1303: 1299: 1295: 1288: 1285: 1280: 1276: 1272: 1268: 1264: 1260: 1253: 1250: 1246: 1241: 1238: 1234: 1229: 1226: 1222: 1217: 1214: 1210: 1206: 1203: 1198: 1195: 1191: 1187: 1184: 1179: 1176: 1171: 1167: 1163: 1159: 1155: 1151: 1144: 1141: 1136: 1132: 1128: 1124: 1120: 1116: 1109: 1107: 1103: 1098: 1094: 1090: 1086: 1079: 1076: 1071: 1067: 1063: 1059: 1055: 1051: 1047: 1043: 1036: 1033: 1028: 1024: 1017: 1014: 1010: 1004: 1001: 988: 984: 980: 977:Page, Lewis. 973: 970: 966: 960: 957: 953: 947: 944: 939: 933: 930: 926: 925: 920: 914: 911: 907: 905: 900: 898: 897:Doe v. Cahill 891: 888: 884: 880: 875: 872: 869: 864: 861: 857: 856: 851: 845: 842: 839: 834: 831: 827: 823: 818: 815: 811: 806: 803: 798: 792: 788: 784: 783: 778: 771: 769: 765: 761: 755: 752: 747: 743: 739: 735: 731: 727: 720: 717: 706:on 2009-04-02 705: 701: 695: 693: 691: 687: 684: 679: 676: 672: 668: 664: 661: 655: 652: 640:on 2015-10-21 639: 635: 631: 624: 622: 620: 616: 613: 608: 605: 602: 596: 593: 587: 583: 580: 577: 576: 572: 569: 565: 564: 560: 558: 555: 554: 550: 548: 546: 542: 536: 534: 529: 527: 523: 522:disinhibition 519: 515: 511: 507: 503: 499: 491: 489: 486: 482: 476: 472: 470: 466: 461: 458: 450: 446:Ramifications 445: 443: 441: 437: 435: 431: 427: 423: 418: 416: 412: 404: 402: 400: 396: 391: 389: 385: 381: 377: 372: 370: 366: 362: 358: 354: 353: 347: 345: 341: 337: 333: 326:United States 325: 323: 321: 313: 311: 309: 305: 301: 297: 289: 287: 285: 281: 273: 270: 262: 260: 258: 254: 250: 245: 243: 239: 235: 231: 227: 222: 221:proxy servers 218: 210: 208: 206: 198: 196: 194: 190: 186: 182: 178: 170: 168: 165: 161: 157: 153: 145: 143: 141: 135: 133: 129: 125: 121: 116: 114: 109: 104: 101: 93: 91: 89: 85: 81: 77: 73: 69: 65: 61: 57: 53: 49: 45: 41: 37: 33: 19: 1297: 1293: 1287: 1262: 1258: 1252: 1240: 1228: 1216: 1197: 1178: 1153: 1149: 1143: 1118: 1114: 1088: 1084: 1078: 1045: 1041: 1035: 1026: 1022: 1016: 1003: 991:. Retrieved 983:The Register 982: 972: 964: 959: 946: 932: 922: 913: 903: 896: 890: 883:514 U.S. 334 878: 874: 863: 853: 844: 833: 817: 805: 781: 754: 729: 725: 719: 708:. Retrieved 704:the original 678: 670: 654: 642:. Retrieved 638:the original 633: 607: 595: 573: 561: 537: 530: 495: 477: 473: 462: 454: 438: 419: 415:IP addresses 408: 392: 376:Doe subpoena 373: 350: 348: 334:and various 329: 317: 293: 277: 269:Doe subpoena 246: 214: 202: 174: 156:IP addresses 149: 136: 117: 97: 78:, and other 46:, without a 38:, anonymous 31: 29: 894:See, e.g., 644:17 November 541:pornography 253:private-key 217:anonymizers 189:coffee shop 160:WikiScanner 84:imageboards 68:JuicyCampus 48:screen name 1339:Categories 796:0805816364 710:2009-03-17 588:References 545:technology 424:and other 336:other laws 318:Under the 296:Philippine 284:microblogs 257:public-key 242:encryption 211:Technology 181:IP address 177:pseudonyms 175:Utilizing 171:Techniques 152:pseudonyms 128:textboards 113:cypherpunk 103:newsgroups 1345:Anonymity 1279:144685973 1135:145697214 746:146575682 485:Glassdoor 434:tripcodes 430:usernames 86:(such as 72:AutoAdmit 64:pseudonym 60:real name 52:pseudonym 36:textboard 1314:27048434 1205:Archived 1186:Archived 1062:15257832 1029:(1): 22. 987:Archived 663:Archived 582:John Doe 551:See also 514:Facebook 440:Slashdot 422:2channel 361:advocacy 308:libelous 167:poster. 120:2channel 76:2channel 56:Slashdot 1170:5829176 1070:8136203 993:20 July 885:(1995). 826:Reuters 526:threads 518:Twitter 365:dissent 363:and of 280:Chinese 140:YouTube 115:group. 82:-based 1312:  1277:  1168:  1133:  1068:  1060:  793:  744:  506:Reddit 426:Futaba 100:Usenet 80:Futaba 1310:S2CID 1275:S2CID 1166:S2CID 1131:S2CID 1066:S2CID 787:53–69 742:S2CID 568:In re 533:4chan 510:4chan 340:press 274:China 234:onion 205:memes 199:Memes 132:Japan 126:were 124:4chan 88:4chan 1058:PMID 995:2011 924:Time 791:ISBN 646:2017 432:and 294:The 255:and 236:and 228:and 122:and 1302:doi 1267:doi 1158:doi 1123:doi 1093:doi 1050:doi 852:", 734:doi 566:, ( 516:or 508:or 380:ISP 249:PGP 230:I2P 226:Tor 30:An 1341:: 1308:. 1296:. 1273:. 1263:10 1261:. 1164:. 1154:18 1152:. 1129:. 1119:28 1117:. 1105:^ 1089:19 1087:. 1064:. 1056:. 1044:. 1025:. 985:. 981:. 921:. 901:; 881:, 824:, 789:. 767:^ 740:. 730:17 728:. 689:^ 669:, 632:. 618:^ 547:. 471:. 74:, 70:, 1316:. 1304:: 1298:1 1281:. 1269:: 1172:. 1160:: 1137:. 1125:: 1099:. 1095:: 1072:. 1052:: 1046:7 1027:8 997:. 908:. 799:. 748:. 736:: 713:. 648:. 20:)

Index

Anonymous Coward
textboard
bulletin board system
Internet forum
screen name
pseudonym
Slashdot
real name
pseudonym
JuicyCampus
AutoAdmit
2channel
Futaba
imageboards
4chan
Usenet
newsgroups
anonymous remailers
cypherpunk
2channel
4chan
textboards
Japan
YouTube
pseudonyms
IP addresses
WikiScanner
Knowledge (XXG)
pseudonyms
IP address

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.