799:
339:
address. Otherwise, the IP address is collected and added to the pool to be redistributed. Thus, IP addresses provide regional information (through
Regional Internet registries) and, if the ISP has logs, specific customer information. While this does not prove that a specific person was the originator of a blog post (it could have been someone else using that customer's Internet, after all), it provides powerful circumstantial evidence.
258:, frequently with dissatisfaction. Most anonymous experience blogs are written anonymously as they allow the customer/user to keep experiencing and using the service, and reporting/blogging, while nudging at a defined and appropriate level against the target organisation. Among these are Sarah Wu's/Mrs Q.
276:
The personal blog strays into personal life in ways that allow more risk taking and open in terms of detail. Hence, many of these blogs are sexual in nature, although many also exist for those with health problems and disabilities and how they see the world and cope with its challenges. Some of the
347:
Character frequency analysis takes advantage of the fact that all individuals have a different vocabulary: if there is a large body of data that can be tied to an individual (for example, a public figure with an official blog), statistical analysis can be applied to both this body of data and an
72:
compares known details about a person's life with the contents of an anonymous blog to look for similarities. If the author does not attempt to conceal their identity, social correlation is a very straightforward procedure: a simple correlation between the "anonymous" blogger's name, profession,
338:
is used; a customer's device (typically a modem or router) is assigned an IP address from a pool of available addresses. It keeps that address for a certain amount of time (e.g., two weeks). If the device is still active at the end of the lease, it can renew its connection and keep the same IP
91:
These techniques may be used together. The order of techniques employed typically escalates from the social correlation techniques, which do not require the compliance of any outside authorities (e.g., Internet providers, server providers, etc.), to more technical identification.
642:
73:
lifestyle, etc., and the known person. Even if an author generally attempts to conceal their identity (by not providing their name, location, etc.), the blog can be deanonymized by correlating seemingly innocuous, general details.
195:
and Google, the IRC disciplined and later dismissed
Wardick. In 2010, an internal enquiry into Wardick's allegations found other such bank accounts, and proposals to overhaul the IRC's management were discussed in the
190:
had sat in an account for over three years. After spending over €140,000 on private investigators and legal expenses to find the whistle blower, including court orders to obtain
Wardick's identity from
50:, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer (e.g., in
107:
A commentary on the political situation within a country, where being open may risk prosecution. Anonymous blogging can also add power to a political debate, such as in 2008 when blogger
166:, which has described life under ISIL occupation in Mosul, Iraq, has been called one of the few reliable sources of information on life inside the city since it began in June 2014.
178:
The whistleblower blog is a modern-day twist on the classical "insider spotting illegality" theme. This can cover all sectors or issues. Among the most notable is that by the
160:
Dissident blogs may document life under an oppressive or secretive regime, while not actively promoting or inspiring revolutionary or counter-revolutionary action.
79:
determines the author's identity through the blog's technical details. In extreme cases, technical identification entails looking at the server logs, the
214:
A company employee or insider reports on company operations and issues from within the organisation. The most famous is probably the Dooce.com blogger
1216:
840:
334:, which they then assign to customers. However, ISPs do not have enough addresses to give the customers their own address. Instead,
187:
348:
anonymous blog to see how similar they are. In this way, anonymous bloggers can tentatively be deanonymized. This is known as
878:
940:
375:
713:
688:
604:
Flynn, Nancy (October 1, 2006). "Need-to-know basics of workplace blogging". Voice of
America, Work & Family Life.
17:
502:
289:
Recently, anonymous blogging has moved into a more aggressive and active style, with organized crime groups such as
128:
These can either be inspiring activity or counter activity, often against a violent state apparatus. For example,
1221:
236:
Written by a citizen of an area, on a particular subject, to bring about a change. In 2007, reporter and blogger
240:
came out in support of anonymous blogger Spocko, who was trying to bring what he called "violent commentary" on
1506:
1162:
813:
100:
Just as a blog can be on any subject, so can an anonymous blog. Most fall into the following major categories:
1673:
833:
1226:
563:
1678:
1211:
267:
772:
172:
Views and comments about religious view points and issues, perhaps questioning some written standpoints.
1088:
331:
68:
527:
1683:
1475:
826:
54:
cases), a government (in countries that monitor or censor online communication), or another group.
1306:
395:
353:
552:"Media, spiritualities and social change". Reference & Research Book News. August 1, 2011.
868:
616:
580:
419:
1611:
910:
8:
1543:
1538:
1463:
1142:
863:
322:
for communication. The most popular implementation of the
Internet Protocol would be the
112:
471:
Sandhya Menon (February 15, 2010). "For the love of change and blogging". Times of Oman.
1688:
1636:
1458:
1282:
1262:
975:
930:
905:
803:
729:"THE LATEST WEAPON TO FIGHT EXTRA FLAB - BLOGGING!". Hindustan Times. January 27, 2009.
677:
390:
380:
1668:
1526:
1521:
1435:
1384:
1109:
709:
684:
319:
215:
119:
80:
1531:
1311:
750:
315:
255:
205:
1626:
1580:
1516:
1511:
1399:
1241:
1068:
1042:
849:
327:
179:
1606:
1272:
915:
888:
754:
330:). Internet Service Providers (ISPs) are allocated chunks of IP addresses by a
290:
223:
143:
116:
38:
without any acknowledged author or contributor. Anonymous bloggers may achieve
1662:
1631:
1621:
1616:
1575:
1548:
1490:
1443:
1394:
1321:
1119:
995:
950:
661:
483:
365:
278:
241:
51:
47:
1124:
990:
204:, then the Minister of Defence. Wardick later successfully sued the IRC for
1470:
1448:
1389:
1336:
1236:
1157:
1000:
945:
935:
201:
138:
1601:
1326:
1005:
985:
955:
920:
706:
Girl With a One Track Mind: Exposed: Further
Revelations of a Sex Blogger
567:
385:
282:
192:
151:
108:
84:
356:
is the study of techniques for resisting such stylistic identification.
182:
head of the international department Noel
Wardick, who highlighted that
1453:
1409:
1356:
1331:
1316:
1231:
1114:
1078:
1037:
349:
311:
237:
115:
sociology graduate student
Jennifer Jennings, successfully questioned
1585:
1568:
1404:
1379:
1341:
1190:
1152:
1147:
1093:
1063:
980:
445:
162:
129:
43:
39:
740:"Fewer bullets, more blogging". The Sunday Herald. December 4, 2011.
1563:
1480:
1414:
1346:
1167:
1134:
1073:
1058:
970:
900:
873:
809:
660:
Thomas, Christine (February 5, 2012). "Explore life's conundrums".
370:
323:
62:
Fundamentally, deanonymization can be divided into two categories:
818:
314:
is a unique numerical label assigned to a computer connected to a
270:
lunch every day for a year, which has now been turned into a book.
1553:
1374:
1351:
1083:
1010:
965:
925:
800:
Computer Law and
Security Report Volume 22 Issue 2, Pages 127-136
293:
using anonymous blogs against mayors and local administrators in
263:
581:"Irish Red Cross: 15 Dec 2010: Dáil debates (KildareStreet.com)"
197:
1653:
1558:
1267:
1195:
1185:
219:
960:
294:
259:
254:
Most experience blogs focus on personal insights or views of
1485:
1277:
1257:
335:
245:
183:
147:
35:
1177:
400:
142:
newspaper under a pseudonym that he could shed only when
342:
227:
503:"Open door: The authentication of anonymous bloggers"
300:
277:latest personal blogs are seen by many as extended
262:, a chronicle of her experience as an adult eating
46:, or through more sophisticated techniques such as
676:
83:logs, and payment information associated with the
659:
1660:
643:"KSFO radio hosts take on blogger's allegations"
674:
326:(capitalized, to differentiate it from smaller
834:
500:
481:
470:
420:"Anonymous Blogging with Wordpress & Tor"
640:
603:
773:"Identifying People by their Writing Style"
679:Fed Up with Lunch: The School Lunch Project
200:on 15 December. Questions were answered by
57:
841:
827:
703:
188:2004 Indian Ocean earthquake and tsunami
126:Revolutionary and counter-revolutionary:
150:. Similar bloggers appeared during the
14:
1661:
744:
614:
608:
597:
525:
822:
764:
343:Word and character frequency analysis
770:
564:"Red Cross blogger reveals identity"
248:to the attention of its advertisers.
848:
675:Sarah Wu/Mrs Q. (October 5, 2011).
482:Schemo, Diana (September 8, 2008).
376:List of anonymously published works
24:
438:
412:
25:
1700:
793:
641:Joe Garofoli (January 13, 2007).
526:Wright, Robin (27 October 2016).
301:How online identity is determined
615:Waters, Darren (July 20, 2005).
562:Charlie Taylor (27 August 2010)
122:'s takeover of New York schools.
802:blogs, Lies and the Doocing by
733:
722:
697:
668:
653:
634:
305:
814:Electronic Frontier Foundation
759:DOD Standard Internet Protocol
573:
556:
545:
519:
501:Chris Elliott (13 June 2011).
494:
475:
464:
450:Electronic Frontier Foundation
226:startup on her personal blog,
13:
1:
528:"The Secret Eye Inside Mosul"
406:
617:"Summary about Dooce By BBC"
281:, covering issues including
252:Experience/Customer Service:
218:, who was fired for writing
186:162,000 in donations to the
42:through the simple use of a
7:
1212:Inter-process communication
647:The San Francisco Chronicle
359:
10:
1705:
879:Web syndication technology
332:Regional Internet registry
48:layered encryption routing
1594:
1499:
1434:
1427:
1365:
1302:
1295:
1250:
1204:
1176:
1133:
1102:
1051:
1030:
1023:
896:
887:
856:
810:Legal Guide for bloggers
260:"Fed Up With Lunch" blog
222:of her experiences at a
95:
77:Technical identification
58:Deanonymizing techniques
704:Abby Lee (5 Mar 2010).
396:Tor (anonymity network)
484:"Wonder wonk unmasked"
426:. Global Voices Online
424:Global Voices Advocacy
371:Anonymous web browsing
354:adversarial stylometry
683:. # Chronicle Books.
585:www.kildarestreet.com
1674:Internet terminology
1612:Glossary of blogging
1576:Social communication
777:Schneier on Security
446:"How to Blog Safely"
111:, later revealed as
244:area radio station
234:Community pressure:
146:no longer ruled in
113:Columbia University
27:Internet phenomenon
1679:Non-fiction genres
1637:Uses of podcasting
1375:Collaborative blog
1370:Anonymous blogging
1263:RSS Advisory Board
931:Electronic journal
804:Sylvia Kierkegaard
391:Anonymous remailer
381:Citizen journalism
220:satirical accounts
1649:
1648:
1645:
1644:
1436:Alternative media
1423:
1422:
1385:Instant messaging
1291:
1290:
1019:
1018:
771:Schneier, Bruce.
490:. New York Media.
488:New York magazine
320:Internet Protocol
216:Heather Armstrong
120:Michael Bloomberg
81:Internet provider
18:Anonymous blogger
16:(Redirected from
1696:
1684:Internet privacy
1432:
1431:
1312:Enhanced podcast
1300:
1299:
1028:
1027:
894:
893:
843:
836:
829:
820:
819:
788:
787:
785:
783:
768:
762:
748:
742:
741:
737:
731:
730:
726:
720:
719:
701:
695:
694:
682:
672:
666:
665:
657:
651:
650:
638:
632:
631:
629:
627:
612:
606:
605:
601:
595:
594:
592:
591:
577:
571:
560:
554:
553:
549:
543:
542:
540:
538:
523:
517:
516:
514:
513:
498:
492:
491:
479:
473:
472:
468:
462:
461:
459:
457:
442:
436:
435:
433:
431:
416:
316:computer network
256:customer service
212:Company insider:
206:unfair dismissal
21:
1704:
1703:
1699:
1698:
1697:
1695:
1694:
1693:
1659:
1658:
1650:
1641:
1627:Slashdot effect
1590:
1581:Social software
1495:
1419:
1400:Mobile blogging
1361:
1287:
1246:
1242:Streaming media
1200:
1172:
1129:
1125:Synchronization
1098:
1047:
1043:Feed URI scheme
1015:
911:Classical music
883:
852:
850:Web syndication
847:
796:
791:
781:
779:
769:
765:
749:
745:
739:
738:
734:
728:
727:
723:
716:
702:
698:
691:
673:
669:
658:
654:
639:
635:
625:
623:
613:
609:
602:
598:
589:
587:
579:
578:
574:
561:
557:
551:
550:
546:
536:
534:
524:
520:
511:
509:
499:
495:
480:
476:
469:
465:
455:
453:
452:. 11 April 2005
444:
443:
439:
429:
427:
418:
417:
413:
409:
362:
345:
308:
303:
180:Irish Red Cross
134:Baghdad blogger
98:
60:
28:
23:
22:
15:
12:
11:
5:
1702:
1692:
1691:
1686:
1681:
1676:
1671:
1657:
1656:
1647:
1646:
1643:
1642:
1640:
1639:
1634:
1629:
1624:
1619:
1614:
1609:
1607:Escribitionist
1604:
1598:
1596:
1592:
1591:
1589:
1588:
1583:
1578:
1573:
1572:
1571:
1566:
1556:
1551:
1546:
1541:
1536:
1535:
1534:
1529:
1524:
1519:
1514:
1503:
1501:
1497:
1496:
1494:
1493:
1488:
1483:
1478:
1476:Search engines
1473:
1468:
1467:
1466:
1461:
1451:
1446:
1440:
1438:
1429:
1425:
1424:
1421:
1420:
1418:
1417:
1412:
1410:Video blogging
1407:
1402:
1397:
1392:
1387:
1382:
1377:
1372:
1366:
1363:
1362:
1360:
1359:
1354:
1349:
1344:
1339:
1334:
1329:
1324:
1319:
1314:
1309:
1303:
1297:
1293:
1292:
1289:
1288:
1286:
1285:
1280:
1275:
1273:World Wide Web
1270:
1265:
1260:
1254:
1252:
1248:
1247:
1245:
1244:
1239:
1234:
1229:
1224:
1219:
1214:
1208:
1206:
1202:
1201:
1199:
1198:
1193:
1188:
1182:
1180:
1174:
1173:
1171:
1170:
1165:
1160:
1155:
1150:
1145:
1139:
1137:
1131:
1130:
1128:
1127:
1122:
1117:
1112:
1106:
1104:
1100:
1099:
1097:
1096:
1091:
1086:
1081:
1076:
1071:
1066:
1061:
1055:
1053:
1049:
1048:
1046:
1045:
1040:
1034:
1032:
1025:
1021:
1020:
1017:
1016:
1014:
1013:
1008:
1003:
998:
993:
988:
983:
978:
973:
968:
963:
958:
953:
948:
943:
938:
933:
928:
923:
918:
913:
908:
903:
897:
891:
885:
884:
882:
881:
876:
871:
866:
861:
857:
854:
853:
846:
845:
838:
831:
823:
817:
816:
807:
795:
794:External links
792:
790:
789:
763:
761:(January 1980)
743:
732:
721:
715:978-0330509695
714:
696:
690:978-1452102283
689:
667:
652:
633:
607:
596:
572:
555:
544:
532:The New Yorker
518:
493:
474:
463:
437:
410:
408:
405:
404:
403:
398:
393:
388:
383:
378:
373:
368:
361:
358:
344:
341:
318:that uses the
307:
304:
302:
299:
287:
286:
271:
249:
231:
209:
176:Whistleblower:
173:
167:
155:
144:Saddam Hussein
123:
117:New York Mayor
97:
94:
89:
88:
74:
59:
56:
32:anonymous blog
26:
9:
6:
4:
3:
2:
1701:
1690:
1687:
1685:
1682:
1680:
1677:
1675:
1672:
1670:
1667:
1666:
1664:
1655:
1654:Blog Personal
1652:
1651:
1638:
1635:
1633:
1632:Spam in blogs
1630:
1628:
1625:
1623:
1622:Posting style
1620:
1618:
1617:Pay per click
1615:
1613:
1610:
1608:
1605:
1603:
1600:
1599:
1597:
1593:
1587:
1584:
1582:
1579:
1577:
1574:
1570:
1567:
1565:
1562:
1561:
1560:
1557:
1555:
1552:
1550:
1549:Broadcatching
1547:
1545:
1542:
1540:
1537:
1533:
1530:
1528:
1525:
1523:
1520:
1518:
1515:
1513:
1510:
1509:
1508:
1505:
1504:
1502:
1498:
1492:
1491:Web directory
1489:
1487:
1484:
1482:
1479:
1477:
1474:
1472:
1469:
1465:
1462:
1460:
1457:
1456:
1455:
1452:
1450:
1447:
1445:
1442:
1441:
1439:
1437:
1433:
1430:
1426:
1416:
1413:
1411:
1408:
1406:
1403:
1401:
1398:
1396:
1393:
1391:
1388:
1386:
1383:
1381:
1378:
1376:
1373:
1371:
1368:
1367:
1364:
1358:
1355:
1353:
1350:
1348:
1345:
1343:
1340:
1338:
1335:
1333:
1330:
1328:
1325:
1323:
1322:Narrowcasting
1320:
1318:
1315:
1313:
1310:
1308:
1307:Audio podcast
1305:
1304:
1301:
1298:
1294:
1284:
1281:
1279:
1276:
1274:
1271:
1269:
1266:
1264:
1261:
1259:
1256:
1255:
1253:
1249:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1223:
1220:
1218:
1215:
1213:
1210:
1209:
1207:
1203:
1197:
1194:
1192:
1189:
1187:
1184:
1183:
1181:
1179:
1175:
1169:
1166:
1164:
1161:
1159:
1156:
1154:
1151:
1149:
1146:
1144:
1141:
1140:
1138:
1136:
1132:
1126:
1123:
1121:
1120:RSS enclosure
1118:
1116:
1113:
1111:
1108:
1107:
1105:
1101:
1095:
1092:
1090:
1087:
1085:
1082:
1080:
1077:
1075:
1072:
1070:
1067:
1065:
1062:
1060:
1057:
1056:
1054:
1050:
1044:
1041:
1039:
1036:
1035:
1033:
1029:
1026:
1022:
1012:
1009:
1007:
1004:
1002:
999:
997:
994:
992:
989:
987:
984:
982:
979:
977:
974:
972:
969:
967:
964:
962:
959:
957:
954:
952:
949:
947:
944:
942:
939:
937:
934:
932:
929:
927:
924:
922:
919:
917:
914:
912:
909:
907:
904:
902:
899:
898:
895:
892:
890:
886:
880:
877:
875:
872:
870:
867:
865:
862:
859:
858:
855:
851:
844:
839:
837:
832:
830:
825:
824:
821:
815:
811:
808:
805:
801:
798:
797:
778:
774:
767:
760:
756:
752:
747:
736:
725:
717:
711:
707:
700:
692:
686:
681:
680:
671:
663:
662:Honolulu Star
656:
648:
644:
637:
622:
618:
611:
600:
586:
582:
576:
570:
569:
565:
559:
548:
533:
529:
522:
508:
504:
497:
489:
485:
478:
467:
451:
447:
441:
425:
421:
415:
411:
402:
399:
397:
394:
392:
389:
387:
384:
382:
379:
377:
374:
372:
369:
367:
366:Anonymous P2P
364:
363:
357:
355:
351:
340:
337:
333:
329:
328:internetworks
325:
321:
317:
313:
298:
296:
292:
284:
280:
279:group therapy
275:
272:
269:
265:
261:
257:
253:
250:
247:
243:
242:San Francisco
239:
235:
232:
229:
225:
221:
217:
213:
210:
207:
203:
199:
194:
189:
185:
181:
177:
174:
171:
168:
165:
164:
159:
156:
153:
149:
145:
141:
140:
135:
131:
127:
124:
121:
118:
114:
110:
106:
103:
102:
101:
93:
86:
82:
78:
75:
71:
70:
65:
64:
63:
55:
53:
52:whistleblower
49:
45:
41:
37:
33:
19:
1471:Online diary
1415:Motovlogging
1390:Liveblogging
1369:
1337:Slidecasting
1237:RSS tracking
1158:Product feed
906:Bloggernacle
780:. Retrieved
776:
766:
758:
746:
735:
724:
705:
699:
678:
670:
655:
646:
636:
624:. Retrieved
620:
610:
599:
588:. Retrieved
584:
575:
566:
558:
547:
535:. Retrieved
531:
521:
510:. Retrieved
507:The Guardian
506:
496:
487:
477:
466:
454:. Retrieved
449:
440:
428:. Retrieved
423:
414:
346:
309:
306:IP addresses
288:
273:
251:
233:
211:
202:Tony Killeen
175:
169:
161:
157:
139:The Guardian
137:
136:, wrote for
133:
125:
104:
99:
90:
76:
66:
61:
31:
29:
1602:Blogosphere
1507:Aggregation
1327:Peercasting
1227:Referencing
921:Dream diary
568:Irish Times
386:Mix network
283:weight loss
268:high school
152:Arab Spring
109:Eduwonkette
85:domain name
69:correlation
1663:Categories
1500:Micromedia
1454:Journalism
1357:Web series
1332:Screencast
1317:Mobilecast
1232:RSS editor
1115:Geotagging
1079:Reblogging
1038:BitTorrent
1024:Technology
869:Podcasting
782:20 October
626:January 5,
590:2020-12-06
537:1 November
512:2012-06-02
456:19 October
430:19 October
407:References
350:stylometry
312:IP address
238:Mike Stark
170:Religious:
158:Dissident:
105:Political:
1689:Anonymity
1586:Web Slice
1444:Carnivals
1405:Spam blog
1395:Microblog
1380:Columnist
1342:Videocast
1153:Photofeed
1148:Data feed
1143:Atom feed
1103:Mechanism
1094:Trackback
1064:Permalink
991:Political
981:Photoblog
916:Corporate
291:the Mafia
274:Personal:
228:dooce.com
163:Mosul Eye
130:Salam Pax
44:pseudonym
40:anonymity
1669:Blogging
1486:Software
1481:Sideblog
1464:Database
1347:Webcomic
1251:Standard
1217:Livemark
1168:Web feed
1163:RDF feed
1135:Memetics
1089:Rollback
1074:Pingback
1059:Linkback
1052:Features
874:Vlogging
864:Blogging
621:BBC News
360:See also
324:Internet
1595:Related
1554:Hashtag
1544:AtomPub
1459:Citizen
1449:Fiction
1352:Webtoon
1084:Refback
1031:General
1011:Warblog
1001:Reverse
996:Project
966:Lifelog
946:Fashion
926:Edublog
860:History
812:by the
708:. Pan.
264:Chicago
224:dot-com
67:Social
1559:NewsML
1527:Search
1522:Review
1268:Usenet
1222:Mashup
1205:Social
1196:RSS TV
1186:GeoRSS
1110:Thread
1006:Travel
986:Police
956:Health
941:Family
806:(2006)
753:
712:
687:
132:, the
1532:Video
1428:Media
889:Types
295:Italy
266:area
96:Types
34:is a
1539:Atom
1517:Poll
1512:News
1296:Form
1283:XOXO
1278:XBEL
1258:OPML
1191:MRSS
1069:Ping
976:News
951:Food
936:Fake
784:2014
710:ISBN
685:ISBN
628:2010
539:2016
458:2014
432:2014
336:DHCP
246:KSFO
198:Dáil
148:Iraq
36:blog
1178:RSS
971:MP3
961:Law
901:Art
755:760
751:RFC
401:I2P
310:An
193:UPC
30:An
1665::
1569:G2
775:.
757:,
645:.
619:.
583:.
530:.
505:.
486:.
448:.
422:.
352:;
297:.
1564:1
842:e
835:t
828:v
786:.
718:.
693:.
664:.
649:.
630:.
593:.
541:.
515:.
460:.
434:.
285:.
230:.
208:.
184:€
154:.
87:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.