788:
328:
address. Otherwise, the IP address is collected and added to the pool to be redistributed. Thus, IP addresses provide regional information (through
Regional Internet registries) and, if the ISP has logs, specific customer information. While this does not prove that a specific person was the originator of a blog post (it could have been someone else using that customer's Internet, after all), it provides powerful circumstantial evidence.
247:, frequently with dissatisfaction. Most anonymous experience blogs are written anonymously as they allow the customer/user to keep experiencing and using the service, and reporting/blogging, while nudging at a defined and appropriate level against the target organisation. Among these are Sarah Wu's/Mrs Q.
265:
The personal blog strays into personal life in ways that allow more risk taking and open in terms of detail. Hence, many of these blogs are sexual in nature, although many also exist for those with health problems and disabilities and how they see the world and cope with its challenges. Some of the
336:
Character frequency analysis takes advantage of the fact that all individuals have a different vocabulary: if there is a large body of data that can be tied to an individual (for example, a public figure with an official blog), statistical analysis can be applied to both this body of data and an
61:
compares known details about a person's life with the contents of an anonymous blog to look for similarities. If the author does not attempt to conceal their identity, social correlation is a very straightforward procedure: a simple correlation between the "anonymous" blogger's name, profession,
327:
is used; a customer's device (typically a modem or router) is assigned an IP address from a pool of available addresses. It keeps that address for a certain amount of time (e.g., two weeks). If the device is still active at the end of the lease, it can renew its connection and keep the same IP
80:
These techniques may be used together. The order of techniques employed typically escalates from the social correlation techniques, which do not require the compliance of any outside authorities (e.g., Internet providers, server providers, etc.), to more technical identification.
631:
62:
lifestyle, etc., and the known person. Even if an author generally attempts to conceal their identity (by not providing their name, location, etc.), the blog can be deanonymized by correlating seemingly innocuous, general details.
184:
and Google, the IRC disciplined and later dismissed
Wardick. In 2010, an internal enquiry into Wardick's allegations found other such bank accounts, and proposals to overhaul the IRC's management were discussed in the
179:
had sat in an account for over three years. After spending over €140,000 on private investigators and legal expenses to find the whistle blower, including court orders to obtain
Wardick's identity from
39:, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer (e.g., in
96:
A commentary on the political situation within a country, where being open may risk prosecution. Anonymous blogging can also add power to a political debate, such as in 2008 when blogger
155:, which has described life under ISIL occupation in Mosul, Iraq, has been called one of the few reliable sources of information on life inside the city since it began in June 2014.
167:
The whistleblower blog is a modern-day twist on the classical "insider spotting illegality" theme. This can cover all sectors or issues. Among the most notable is that by the
149:
Dissident blogs may document life under an oppressive or secretive regime, while not actively promoting or inspiring revolutionary or counter-revolutionary action.
68:
determines the author's identity through the blog's technical details. In extreme cases, technical identification entails looking at the server logs, the
203:
A company employee or insider reports on company operations and issues from within the organisation. The most famous is probably the Dooce.com blogger
829:
176:
867:
929:
364:
702:
677:
323:, which they then assign to customers. However, ISPs do not have enough addresses to give the customers their own address. Instead,
1210:
337:
anonymous blog to see how similar they are. In this way, anonymous bloggers can tentatively be deanonymized. This is known as
1495:
1151:
802:
1662:
822:
1215:
1667:
1200:
593:
Flynn, Nancy (October 1, 2006). "Need-to-know basics of workplace blogging". Voice of
America, Work & Family Life.
256:
491:
278:
Recently, anonymous blogging has moved into a more aggressive and active style, with organized crime groups such as
1077:
320:
57:
117:
These can either be inspiring activity or counter activity, often against a violent state apparatus. For example,
1672:
225:
Written by a citizen of an area, on a particular subject, to bring about a change. In 2007, reporter and blogger
229:
came out in support of anonymous blogger Spocko, who was trying to bring what he called "violent commentary" on
815:
89:
Just as a blog can be on any subject, so can an anonymous blog. Most fall into the following major categories:
1295:
384:
552:
1464:
342:
857:
761:
161:
Views and comments about religious view points and issues, perhaps questioning some written standpoints.
516:
1600:
899:
1532:
1527:
1452:
1131:
852:
101:
43:
cases), a government (in countries that monitor or censor online communication), or another group.
1677:
1625:
1447:
1271:
1251:
964:
919:
894:
792:
379:
369:
1657:
1515:
1510:
1424:
1373:
1205:
1098:
698:
673:
541:"Media, spiritualities and social change". Reference & Research Book News. August 1, 2011.
308:
204:
108:
69:
605:
569:
408:
1520:
1300:
739:
304:
244:
194:
1615:
1569:
1505:
1500:
1388:
1230:
1057:
1031:
838:
316:
168:
311:
for communication. The most popular implementation of the
Internet Protocol would be the
460:
Sandhya Menon (February 15, 2010). "For the love of change and blogging". Times of Oman.
1595:
1261:
904:
877:
718:"THE LATEST WEAPON TO FIGHT EXTRA FLAB - BLOGGING!". Hindustan Times. January 27, 2009.
666:
279:
212:
132:
105:
1651:
1620:
1610:
1605:
1564:
1537:
1479:
1432:
1383:
1310:
1108:
984:
939:
650:
354:
267:
230:
40:
36:
1459:
1437:
1378:
1325:
1225:
1146:
989:
934:
924:
190:
127:
1590:
1315:
994:
974:
944:
909:
556:
374:
271:
181:
140:
97:
73:
743:
319:). Internet Service Providers (ISPs) are allocated chunks of IP addresses by a
27:
without any acknowledged author or contributor. Anonymous bloggers may achieve
1442:
1398:
1345:
1320:
1305:
1220:
1103:
1067:
1026:
338:
300:
226:
472:
1574:
1557:
1393:
1368:
1330:
1179:
1141:
1136:
1082:
1052:
969:
193:, then the Minister of Defence. Wardick later successfully sued the IRC for
151:
118:
32:
28:
1552:
1469:
1403:
1335:
1156:
1123:
1113:
1062:
1047:
959:
889:
695:
Girl With a One Track Mind: Exposed: Further
Revelations of a Sex Blogger
359:
312:
345:
is the study of techniques for resisting such stylistic identification.
171:
head of the international department Noel
Wardick, who highlighted that
1542:
1340:
1072:
999:
954:
914:
252:
186:
104:
sociology graduate student
Jennifer Jennings, successfully questioned
1547:
1256:
1184:
1174:
434:
208:
729:"Fewer bullets, more blogging". The Sunday Herald. December 4, 2011.
798:
649:
Thomas, Christine (February 5, 2012). "Explore life's conundrums".
51:
Fundamentally, deanonymization can be divided into two categories:
949:
807:
303:
is a unique numerical label assigned to a computer connected to a
283:
259:
lunch every day for a year, which has now been turned into a book.
789:
Computer Law and
Security Report Volume 22 Issue 2, Pages 127-136
282:
using anonymous blogs against mayors and local administrators in
1474:
1363:
1266:
1246:
979:
862:
570:"Irish Red Cross: 15 Dec 2010: Dáil debates (KildareStreet.com)"
324:
234:
172:
136:
24:
1642:
811:
1166:
389:
248:
243:
Most experience blogs focus on personal insights or views of
131:
newspaper under a pseudonym that he could shed only when
216:
492:"Open door: The authentication of anonymous bloggers"
1583:
1488:
1423:
1416:
1284:
1239:
1193:
1165:
1122:
1091:
1040:
1019:
1012:
876:
266:latest personal blogs are seen by many as extended
251:, a chronicle of her experience as an adult eating
35:, or through more sophisticated techniques such as
665:
72:logs, and payment information associated with the
632:"KSFO radio hosts take on blogger's allegations"
315:(capitalized, to differentiate it from smaller
823:
409:"Anonymous Blogging with Wordpress & Tor"
8:
762:"Identifying People by their Writing Style"
668:Fed Up with Lunch: The School Lunch Project
189:on 15 December. Questions were answered by
1420:
1288:
1016:
882:
830:
816:
808:
177:2004 Indian Ocean earthquake and tsunami
115:Revolutionary and counter-revolutionary:
400:
139:. Similar bloggers appeared during the
332:Word and character frequency analysis
7:
553:"Red Cross blogger reveals identity"
237:to the attention of its advertisers.
664:Sarah Wu/Mrs Q. (October 5, 2011).
471:Schemo, Diana (September 8, 2008).
365:List of anonymously published works
14:
630:Joe Garofoli (January 13, 2007).
515:Wright, Robin (27 October 2016).
290:How online identity is determined
604:Waters, Darren (July 20, 2005).
551:Charlie Taylor (27 August 2010)
111:'s takeover of New York schools.
791:blogs, Lies and the Doocing by
803:Electronic Frontier Foundation
748:DOD Standard Internet Protocol
490:Chris Elliott (13 June 2011).
439:Electronic Frontier Foundation
215:startup on her personal blog,
1:
517:"The Secret Eye Inside Mosul"
606:"Summary about Dooce By BBC"
270:, covering issues including
241:Experience/Customer Service:
207:, who was fired for writing
175:162,000 in donations to the
31:through the simple use of a
1201:Inter-process communication
636:The San Francisco Chronicle
1694:
868:Web syndication technology
321:Regional Internet registry
37:layered encryption routing
1354:
1291:
885:
845:
799:Legal Guide for bloggers
249:"Fed Up With Lunch" blog
211:of her experiences at a
66:Technical identification
47:Deanonymizing techniques
693:Abby Lee (5 Mar 2010).
385:Tor (anonymity network)
473:"Wonder wonk unmasked"
415:. Global Voices Online
413:Global Voices Advocacy
360:Anonymous web browsing
343:adversarial stylometry
672:. # Chronicle Books.
574:www.kildarestreet.com
1663:Internet terminology
1601:Glossary of blogging
1565:Social communication
766:Schneier on Security
435:"How to Blog Safely"
100:, later revealed as
233:area radio station
223:Community pressure:
135:no longer ruled in
102:Columbia University
16:Internet phenomenon
1668:Non-fiction genres
1626:Uses of podcasting
1364:Collaborative blog
1359:Anonymous blogging
1252:RSS Advisory Board
920:Electronic journal
793:Sylvia Kierkegaard
380:Anonymous remailer
370:Citizen journalism
209:satirical accounts
1638:
1637:
1634:
1633:
1425:Alternative media
1412:
1411:
1374:Instant messaging
1280:
1279:
1008:
1007:
760:Schneier, Bruce.
479:. New York Media.
477:New York magazine
309:Internet Protocol
205:Heather Armstrong
109:Michael Bloomberg
70:Internet provider
1685:
1673:Internet privacy
1421:
1301:Enhanced podcast
1289:
1017:
883:
832:
825:
818:
809:
777:
776:
774:
772:
757:
751:
737:
731:
730:
726:
720:
719:
715:
709:
708:
690:
684:
683:
671:
661:
655:
654:
646:
640:
639:
627:
621:
620:
618:
616:
601:
595:
594:
590:
584:
583:
581:
580:
566:
560:
549:
543:
542:
538:
532:
531:
529:
527:
512:
506:
505:
503:
502:
487:
481:
480:
468:
462:
461:
457:
451:
450:
448:
446:
431:
425:
424:
422:
420:
405:
305:computer network
245:customer service
201:Company insider:
195:unfair dismissal
1693:
1692:
1688:
1687:
1686:
1684:
1683:
1682:
1648:
1647:
1639:
1630:
1616:Slashdot effect
1579:
1570:Social software
1484:
1408:
1389:Mobile blogging
1350:
1276:
1235:
1231:Streaming media
1189:
1161:
1118:
1114:Synchronization
1087:
1036:
1032:Feed URI scheme
1004:
900:Classical music
872:
841:
839:Web syndication
836:
785:
780:
770:
768:
759:
758:
754:
738:
734:
728:
727:
723:
717:
716:
712:
705:
692:
691:
687:
680:
663:
662:
658:
648:
647:
643:
629:
628:
624:
614:
612:
603:
602:
598:
592:
591:
587:
578:
576:
568:
567:
563:
550:
546:
540:
539:
535:
525:
523:
514:
513:
509:
500:
498:
489:
488:
484:
470:
469:
465:
459:
458:
454:
444:
442:
441:. 11 April 2005
433:
432:
428:
418:
416:
407:
406:
402:
398:
351:
334:
297:
292:
169:Irish Red Cross
123:Baghdad blogger
87:
49:
17:
12:
11:
5:
1691:
1689:
1681:
1680:
1675:
1670:
1665:
1660:
1650:
1649:
1646:
1645:
1636:
1635:
1632:
1631:
1629:
1628:
1623:
1618:
1613:
1608:
1603:
1598:
1596:Escribitionist
1593:
1587:
1585:
1581:
1580:
1578:
1577:
1572:
1567:
1562:
1561:
1560:
1555:
1545:
1540:
1535:
1530:
1525:
1524:
1523:
1518:
1513:
1508:
1503:
1492:
1490:
1486:
1485:
1483:
1482:
1477:
1472:
1467:
1465:Search engines
1462:
1457:
1456:
1455:
1450:
1440:
1435:
1429:
1427:
1418:
1414:
1413:
1410:
1409:
1407:
1406:
1401:
1399:Video blogging
1396:
1391:
1386:
1381:
1376:
1371:
1366:
1361:
1355:
1352:
1351:
1349:
1348:
1343:
1338:
1333:
1328:
1323:
1318:
1313:
1308:
1303:
1298:
1292:
1286:
1282:
1281:
1278:
1277:
1275:
1274:
1269:
1264:
1262:World Wide Web
1259:
1254:
1249:
1243:
1241:
1237:
1236:
1234:
1233:
1228:
1223:
1218:
1213:
1208:
1203:
1197:
1195:
1191:
1190:
1188:
1187:
1182:
1177:
1171:
1169:
1163:
1162:
1160:
1159:
1154:
1149:
1144:
1139:
1134:
1128:
1126:
1120:
1119:
1117:
1116:
1111:
1106:
1101:
1095:
1093:
1089:
1088:
1086:
1085:
1080:
1075:
1070:
1065:
1060:
1055:
1050:
1044:
1042:
1038:
1037:
1035:
1034:
1029:
1023:
1021:
1014:
1010:
1009:
1006:
1005:
1003:
1002:
997:
992:
987:
982:
977:
972:
967:
962:
957:
952:
947:
942:
937:
932:
927:
922:
917:
912:
907:
902:
897:
892:
886:
880:
874:
873:
871:
870:
865:
860:
855:
850:
846:
843:
842:
837:
835:
834:
827:
820:
812:
806:
805:
796:
784:
783:External links
781:
779:
778:
752:
750:(January 1980)
732:
721:
710:
704:978-0330509695
703:
685:
679:978-1452102283
678:
656:
641:
622:
596:
585:
561:
544:
533:
521:The New Yorker
507:
482:
463:
452:
426:
399:
397:
394:
393:
392:
387:
382:
377:
372:
367:
362:
357:
350:
347:
333:
330:
307:that uses the
296:
293:
291:
288:
276:
275:
260:
238:
220:
198:
165:Whistleblower:
162:
156:
144:
133:Saddam Hussein
112:
106:New York Mayor
86:
83:
78:
77:
63:
48:
45:
21:anonymous blog
15:
13:
10:
9:
6:
4:
3:
2:
1690:
1679:
1676:
1674:
1671:
1669:
1666:
1664:
1661:
1659:
1656:
1655:
1653:
1644:
1643:Blog Personal
1641:
1640:
1627:
1624:
1622:
1621:Spam in blogs
1619:
1617:
1614:
1612:
1611:Posting style
1609:
1607:
1606:Pay per click
1604:
1602:
1599:
1597:
1594:
1592:
1589:
1588:
1586:
1582:
1576:
1573:
1571:
1568:
1566:
1563:
1559:
1556:
1554:
1551:
1550:
1549:
1546:
1544:
1541:
1539:
1538:Broadcatching
1536:
1534:
1531:
1529:
1526:
1522:
1519:
1517:
1514:
1512:
1509:
1507:
1504:
1502:
1499:
1498:
1497:
1494:
1493:
1491:
1487:
1481:
1480:Web directory
1478:
1476:
1473:
1471:
1468:
1466:
1463:
1461:
1458:
1454:
1451:
1449:
1446:
1445:
1444:
1441:
1439:
1436:
1434:
1431:
1430:
1428:
1426:
1422:
1419:
1415:
1405:
1402:
1400:
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1360:
1357:
1356:
1353:
1347:
1344:
1342:
1339:
1337:
1334:
1332:
1329:
1327:
1324:
1322:
1319:
1317:
1314:
1312:
1311:Narrowcasting
1309:
1307:
1304:
1302:
1299:
1297:
1296:Audio podcast
1294:
1293:
1290:
1287:
1283:
1273:
1270:
1268:
1265:
1263:
1260:
1258:
1255:
1253:
1250:
1248:
1245:
1244:
1242:
1238:
1232:
1229:
1227:
1224:
1222:
1219:
1217:
1214:
1212:
1209:
1207:
1204:
1202:
1199:
1198:
1196:
1192:
1186:
1183:
1181:
1178:
1176:
1173:
1172:
1170:
1168:
1164:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1129:
1127:
1125:
1121:
1115:
1112:
1110:
1109:RSS enclosure
1107:
1105:
1102:
1100:
1097:
1096:
1094:
1090:
1084:
1081:
1079:
1076:
1074:
1071:
1069:
1066:
1064:
1061:
1059:
1056:
1054:
1051:
1049:
1046:
1045:
1043:
1039:
1033:
1030:
1028:
1025:
1024:
1022:
1018:
1015:
1011:
1001:
998:
996:
993:
991:
988:
986:
983:
981:
978:
976:
973:
971:
968:
966:
963:
961:
958:
956:
953:
951:
948:
946:
943:
941:
938:
936:
933:
931:
928:
926:
923:
921:
918:
916:
913:
911:
908:
906:
903:
901:
898:
896:
893:
891:
888:
887:
884:
881:
879:
875:
869:
866:
864:
861:
859:
856:
854:
851:
848:
847:
844:
840:
833:
828:
826:
821:
819:
814:
813:
810:
804:
800:
797:
794:
790:
787:
786:
782:
767:
763:
756:
753:
749:
745:
741:
736:
733:
725:
722:
714:
711:
706:
700:
696:
689:
686:
681:
675:
670:
669:
660:
657:
652:
651:Honolulu Star
645:
642:
637:
633:
626:
623:
611:
607:
600:
597:
589:
586:
575:
571:
565:
562:
559:
558:
554:
548:
545:
537:
534:
522:
518:
511:
508:
497:
493:
486:
483:
478:
474:
467:
464:
456:
453:
440:
436:
430:
427:
414:
410:
404:
401:
395:
391:
388:
386:
383:
381:
378:
376:
373:
371:
368:
366:
363:
361:
358:
356:
355:Anonymous P2P
353:
352:
348:
346:
344:
340:
331:
329:
326:
322:
318:
317:internetworks
314:
310:
306:
302:
294:
289:
287:
285:
281:
273:
269:
268:group therapy
264:
261:
258:
254:
250:
246:
242:
239:
236:
232:
231:San Francisco
228:
224:
221:
218:
214:
210:
206:
202:
199:
196:
192:
188:
183:
178:
174:
170:
166:
163:
160:
157:
154:
153:
148:
145:
142:
138:
134:
130:
129:
124:
120:
116:
113:
110:
107:
103:
99:
95:
92:
91:
90:
84:
82:
75:
71:
67:
64:
60:
59:
54:
53:
52:
46:
44:
42:
41:whistleblower
38:
34:
30:
26:
22:
1460:Online diary
1404:Motovlogging
1379:Liveblogging
1358:
1326:Slidecasting
1226:RSS tracking
1147:Product feed
895:Bloggernacle
769:. Retrieved
765:
755:
747:
735:
724:
713:
694:
688:
667:
659:
644:
635:
625:
613:. Retrieved
609:
599:
588:
577:. Retrieved
573:
564:
555:
547:
536:
524:. Retrieved
520:
510:
499:. Retrieved
496:The Guardian
495:
485:
476:
466:
455:
443:. Retrieved
438:
429:
417:. Retrieved
412:
403:
335:
298:
295:IP addresses
277:
262:
240:
222:
200:
191:Tony Killeen
164:
158:
150:
146:
128:The Guardian
126:
125:, wrote for
122:
114:
93:
88:
79:
65:
55:
50:
20:
18:
1591:Blogosphere
1496:Aggregation
1316:Peercasting
1216:Referencing
910:Dream diary
557:Irish Times
375:Mix network
272:weight loss
257:high school
141:Arab Spring
98:Eduwonkette
74:domain name
58:correlation
1652:Categories
1489:Micromedia
1443:Journalism
1346:Web series
1321:Screencast
1306:Mobilecast
1221:RSS editor
1104:Geotagging
1068:Reblogging
1027:BitTorrent
1013:Technology
858:Podcasting
771:20 October
615:January 5,
579:2020-12-06
526:1 November
501:2012-06-02
445:19 October
419:19 October
396:References
339:stylometry
301:IP address
227:Mike Stark
159:Religious:
147:Dissident:
94:Political:
1678:Anonymity
1575:Web Slice
1433:Carnivals
1394:Spam blog
1384:Microblog
1369:Columnist
1331:Videocast
1142:Photofeed
1137:Data feed
1132:Atom feed
1092:Mechanism
1083:Trackback
1053:Permalink
980:Political
970:Photoblog
905:Corporate
280:the Mafia
263:Personal:
217:dooce.com
152:Mosul Eye
119:Salam Pax
33:pseudonym
29:anonymity
1658:Blogging
1475:Software
1470:Sideblog
1453:Database
1336:Webcomic
1240:Standard
1206:Livemark
1157:Web feed
1152:RDF feed
1124:Memetics
1078:Rollback
1063:Pingback
1048:Linkback
1041:Features
863:Vlogging
853:Blogging
610:BBC News
349:See also
313:Internet
1584:Related
1543:Hashtag
1533:AtomPub
1448:Citizen
1438:Fiction
1341:Webtoon
1073:Refback
1020:General
1000:Warblog
990:Reverse
985:Project
955:Lifelog
935:Fashion
915:Edublog
849:History
801:by the
697:. Pan.
253:Chicago
213:dot-com
56:Social
1548:NewsML
1516:Search
1511:Review
1257:Usenet
1211:Mashup
1194:Social
1185:RSS TV
1175:GeoRSS
1099:Thread
995:Travel
975:Police
945:Health
930:Family
795:(2006)
742:
701:
676:
121:, the
1521:Video
1417:Media
878:Types
284:Italy
255:area
85:Types
23:is a
1528:Atom
1506:Poll
1501:News
1285:Form
1272:XOXO
1267:XBEL
1247:OPML
1180:MRSS
1058:Ping
965:News
940:Food
925:Fake
773:2014
699:ISBN
674:ISBN
617:2010
528:2016
447:2014
421:2014
325:DHCP
235:KSFO
187:Dáil
137:Iraq
25:blog
1167:RSS
960:MP3
950:Law
890:Art
744:760
740:RFC
390:I2P
299:An
182:UPC
19:An
1654::
1558:G2
764:.
746:,
634:.
608:.
572:.
519:.
494:.
475:.
437:.
411:.
341:;
286:.
1553:1
831:e
824:t
817:v
775:.
707:.
682:.
653:.
638:.
619:.
582:.
530:.
504:.
449:.
423:.
274:.
219:.
197:.
173:€
143:.
76:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.