logo

Pseudonymous

Share on facebook
Share on twitter

What is PSEUDONYMITY? What does PSEUDONYMITY mean? PSEUDONYMITY meaning & explanation

1 639 views | 8 Jul. 2017

✪✪✪✪✪

✪✪✪✪✪ http://www.theaudiopedia.com ✪✪✪✪✪

What is PSEUDONYMITY? What does PSEUDONYMITY mean? PSEUDONYMITY meaning - PSEUDONYMITY pronunciation - PSEUDONYMITY definition - PSEUDONYMITY explanation - Hos to pronounce PSEUDONYMITY?

Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license.

SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ

Pseudonymity, a word derived from pseudonym, meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names (that is, legal identities). Most pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve, and is often fraught with legal issues. True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name.

Although the term is most frequently used today with regard to identity and the Internet, the concept of pseudonymity has a long history. In ancient literature it was common to write in the name of a famous person, not for concealment or with any intention of deceit; in the New Testament, the second letter of Peter is probably such. A more modern example is all of The Federalist Papers, which were signed by Publius, a pseudonym representing the trio of James Madison, Alexander Hamilton, and John Jay. The papers were written partially in response to several Anti-Federalist Papers, also written under pseudonyms. As a result of this pseudonymity, historians know that the papers were written by Madison, Hamilton, and Jay, but have not been able to discern with complete accuracy which of the three authored a few of the papers.

Pseudonymity has become an important phenomenon on the Internet and other computer networks. In computer networks, pseudonyms possess varying degrees of anonymity, ranging from highly linkable public pseudonyms (the link between the pseudonym and a human being is publicly known or easy to discover), potentially linkable non-public pseudonyms (the link is known to system operators but is not publicly disclosed), and unlinkable pseudonyms (the link is not known to system operators and cannot be determined). For example, true anonymous remailer enables Internet users to establish unlinkable pseudonyms; those that employ non-public pseudonyms (such as the now-defunct Penet remailer) are called pseudonymous remailers.

The continuum of unlinkability can also be seen, in part, on Wikipedia. Some registered users make no attempt to disguise their real identities (for example, by placing their real name on their user page). The pseudonym of unregistered users is their IP address, which can, in many cases, easily be linked to them. Other registered users prefer to remain anonymous, and do not disclose identifying information. However, Wikipedia's server logs may enable system administrators to determine the IP address, and perhaps the true name, of a registered user (see Wikipedia:Privacy Policy for a list of the conditions under which such a linkage would be attempted). It is possible, in theory, to create an unlinkable Wikipedia pseudonym by using an Open proxy, a Web server that disguises the user's IP address. However, most open proxy addresses are blocked indefinitely due to their frequent use by vandals (see Wikipedia:Blocking policy). Additionally, Wikipedia's public record of a user's interest areas, writing style, and argumentative positions may still establish an identifiable pattern.

System operators (sysops) at sites offering pseudonymity, such as Wikipedia, are not likely to build unlinkability into their systems, as this would render them unable to obtain information about abusive users quickly enough to stop vandalism and other undesirable behaviors. Law enforcement personnel, fearing an avalanche of illegal behavior are equally unenthusiastic. Still, some users and privacy activists like the American Civil Liberties Union believe that Internet users deserve stronger pseudonymity so that they can protect themselves against identity theft, illegal government surveillance, stalking, and other unwelcome consequences of Internet use (including unintentional disclosures of their personal information, as discussed in the next section).....

Pseudonymous

Share on facebook
Share on twitter

AN INTERVIEW WITH PSEUDONYMOUS BOSCH

3 312 views | 6 Apr. 2017

An interview with NEW YORK

An interview with NEW YORK TIMES bestselling author Pseudonymous Bosch. Exploring his latest BAD BOOKS series, and asking the important question: Does Pseudonymous Bosch believe in dragons?

-----

LET'S BE FRIENDS! ?

Facebook: http://facebook.com/littlebrownyoungr...

Instagram: http://instagram.com/littlebrownyoung...

Twitter: http://twitter.com/LittleBrownYR

Pseudonymous

Share on facebook
Share on twitter

ThinkActive: Designing for Pseudonymous Activity Tracking in the Classroom

133 views | 15 May. 2018

ThinkActive: Designing

ThinkActive: Designing for Pseudonymous Activity Tracking in the Classroom

Andrew Garbett, David Chatting, Gerard Wilkinson, Clement Lee, Ahmed Kharrufa

CHI '18: ACM CHI Conference on Human Factors in Computing Systems

Session: Personal Tracking

Abstract

We report on the design of ThinkActive - a system to encourage primary aged school children to reflect on their own personal activity data in the classroom. We deployed the system with a cohort of 30 school children, over a six-week period, in partnership with an English Premier League Football club’s health and nutrition programme. The system utilizes inexpensive activity trackers and pseudonymous avatars to promote reflection with personal data using an in-situ display within the classroom. Our design explores pseudonymity as an approach to managing privacy and personal data within a public setting. We report on the motivations, challenges, and opportunities for students, teachers, and third-party providers to engage in the collection and sharing of activity data with primary school children.

DOI:: https://doi.org/10.1145/3173574.3173581

WEB:: https://chi2018.acm.org/

Recorded at the ACM CHI Conference on Human Factors in Computing Systems in Montréal, Canada April 21-26, 2018