CRIM 414 Lecture Notes - Lecture 7: Duckduckgo, Proxy Server, Identifiability
Document Summary
Many internet users assume that their identity can be readily obscured: don"t make obvious who you are and no one can tell . Consider the ring of gyges (from plato"s republic): this mythical artefact gave its owner the power to become invisible at will. Drugs, firearms, child porn, terrorist, extremist related: concern for personal privacy. A degree of anonymity is available through use of pseudonyms. Examples: pen names (authors), nicknames, credit card numbers (identifier that relate to individualuse as a substitute for identifier to point to certain person), student numbers, bank account numbers, etc. ; email aliases (crimsadv@sfu. ca: widely used in social networking and other virtual communication. Allow for misrepresentation, e. g. , online a male can pose as a female and vice versa. No matter how much you cover your tracks, there is always some information that can potentially be used to identify you. Due to the nature of the internet, you cannot ever be truly anonymous.