{"id":144,"date":"2014-10-26T22:46:44","date_gmt":"2014-10-26T22:46:44","guid":{"rendered":"http:\/\/dinj18hoursaway.wordpress.com\/?p=27"},"modified":"2014-10-26T22:46:44","modified_gmt":"2014-10-26T22:46:44","slug":"anonymity-one-of-the-most-powerful-inventions","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2033\/2014\/topic-2-2014\/2014\/10\/anonymity-one-of-the-most-powerful-inventions\/","title":{"rendered":"Anonymity: one of the most powerful inventions."},"content":{"rendered":"<p>For many users of <a href=\"http:\/\/www.4chan.org\/\">4chan<\/a>, August 31st 2014 comes down as one of the most controversial internet events in history. <em>The Fappening<\/em>,\u00a0which still has accumulated over thirty-thousand hashtag counts just this past month, is the hacking of over 200 private photos of celebrities. The hacks were confirmed to have been aimed towards <a href=\"http:\/\/www.theguardian.com\/technology\/2014\/sep\/01\/naked-celebrity-hack-icloud-backup-jennifer-lawrence\">Apple&#8217;s cloud services or better known as iCloud<\/a>. This event stirred a lot of debate towards internet security. What could have been different to stop this from being ever happened?<\/p>\n<p>Two factors came into play that made the hacking possible &#8211; the alleged\u00a0compromising\u00a0of Apple&#8217;s database and the victim&#8217;s account information.\u00a0Having multiple online identities and particularly an anonymous one is a growing trend in the digital world. It would be naive to think that the hackers wouldn&#8217;t find another possible way to obtain the images had the account informations been anonymous or under pseudonyms but it would&#8217;ve surely decreased the risks.<\/p>\n<p>On the other hand, it can be argued that anonymity gave the hackers power in the first place. By hiding behind several layers of proxy servers, they were able to perform the attacks with confidence. Anonymity, in the hands of the wrong people, is evidently <a href=\"http:\/\/www.wired.com\/2010\/03\/tjx-sentencing\/\">dangerous<\/a>.<\/p>\n<blockquote><p>&#8220;As soon as you log into a Gmail account, you start getting ads for the drug rehab you want to forget. If you&#8217;re in a real-name environment, such as Facebook, unless you actually physically change your name and your friends, you&#8217;re thrown right back into your old life.&#8221;<\/p>\n<p>-\u00a0Andrew Lewman, Executive Director of <a title=\"\" href=\"https:\/\/www.torproject.org\/\">the Tor Project<\/a>.<\/p><\/blockquote>\n<p>Lewman makes a revealing point that I can personally relate to.\u00a0Online gaming was a big part of my life growing up and as\u00a0clich\u00e9 as it may sound it served as a place to find myself. In the real world, I was an awkward 15 year old with low self esteem, in game, I was\u00a0<strong>someone else<\/strong>. Separating my real self from my online persona gave me liberty to shape the person I am today.<\/p>\n<p>Contrary to popular beliefs, the digital world is slowly dialling down the need for having multiple online identities. Convenience is as important to a lot of people as is anonymity. Knowing I can share almost literally all on Facebook is a big plus.<\/p>\n<p>Having multiple online identities gives the user the sense of power, control and liberty. Unfortunately, anyone can have them.<\/p>\n<blockquote><p>&#8220;With great power comes great responsibility.&#8221;<\/p>\n<p>- Uncle Ben from The Spiderman.<\/p><\/blockquote>\n<p><a href=\"https:\/\/dinj18hoursaway.files.wordpress.com\/2014\/10\/141026-224059.jpg\"><img class=\"size-medium wp-image-30 aligncenter\" src=\"https:\/\/dinj18hoursaway.files.wordpress.com\/2014\/10\/141026-224059.jpg?w=300&#038;h=225\" alt=\"141026-224059\" width=\"300\" height=\"225\" \/><\/a><\/p>\n<div id=\"attachment_31\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/dinj18hoursaway.files.wordpress.com\/2014\/10\/141026-224346.jpg\"><img class=\"size-medium wp-image-31\" src=\"https:\/\/dinj18hoursaway.files.wordpress.com\/2014\/10\/141026-224346.jpg?w=300&#038;h=225\" alt=\"Having multiple online identities is easy. Here are just a couple of mine.\" width=\"300\" height=\"225\" \/><\/a><p class=\"wp-caption-text\">Having multiple online identities is easy. Here are just a couple of mine.<\/p><\/div>\n<p><strong>References:<\/strong><\/p>\n<p>The Fappening &#8211; <a href=\"http:\/\/www.theguardian.com\/technology\/2014\/sep\/01\/naked-celebrity-hack-icloud-backup-jennifer-lawrence\">http:\/\/www.theguardian.com\/technology\/2014\/sep\/01\/naked-celebrity-hack-icloud-backup-jennifer-lawrence<\/a><\/p>\n<p>TJX Hacker Gets 20 Years in Prison &#8211; <a href=\"http:\/\/www.wired.com\/2010\/03\/tjx-sentencing\/\">http:\/\/www.wired.com\/2010\/03\/tjx-sentencing\/<\/a><\/p>\n<p>Authenticity vs Anonymity: <a href=\"http:\/\/www.theguardian.com\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity\">http:\/\/www.theguardian.com\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity<\/a><\/p><br \/>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/dinj18hoursaway.wordpress.com\/27\/\"><img alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/dinj18hoursaway.wordpress.com\/27\/\" \/><\/a> <img alt=\"\" border=\"0\" src=\"http:\/\/pixel.wp.com\/b.gif?host=dinj18hoursaway.wordpress.com&#038;blog=76256152&%23038;post=27&%23038;subd=dinj18hoursaway&%23038;ref=&%23038;feed=1\" width=\"1\" height=\"1\" \/>","protected":false},"excerpt":{"rendered":"<p>For many users of 4chan, August 31st 2014 comes down as one of the most controversial internet events in history. The Fappening,&nbsp;which still has accumulated over thirty-thousand hashtag counts just this past month, is the hacking of over 200 private photos of celebrities. The hacks were confirmed to have been aimed towards Apple&rsquo;s cloud services [&hellip;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/pixel.wp.com\/b.gif?host=dinj18hoursaway.wordpress.com&amp;blog=76256152&amp;post=27&amp;subd=dinj18hoursaway&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":94711,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031947],"tags":[],"class_list":["post-144","post","type-post","status-publish","format-standard","hentry","category-topic-2-2014","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/users\/94711"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":2,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"predecessor-version":[{"id":523,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/144\/revisions\/523"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}