CRIM 414 Lecture Notes - Lecture 7: Duckduckgo, Proxy Server, Identifiability

32 views7 pages

Document Summary

Many internet users assume that their identity can be readily obscured: don"t make obvious who you are and no one can tell . Consider the ring of gyges (from plato"s republic): this mythical artefact gave its owner the power to become invisible at will. Drugs, firearms, child porn, terrorist, extremist related: concern for personal privacy. A degree of anonymity is available through use of pseudonyms. Examples: pen names (authors), nicknames, credit card numbers (identifier that relate to individualuse as a substitute for identifier to point to certain person), student numbers, bank account numbers, etc. ; email aliases (crimsadv@sfu. ca: widely used in social networking and other virtual communication. Allow for misrepresentation, e. g. , online a male can pose as a female and vice versa. No matter how much you cover your tracks, there is always some information that can potentially be used to identify you. Due to the nature of the internet, you cannot ever be truly anonymous.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents