Browse Definitions :
Definition

nym

Contributor(s): Mark Wicklund

A nym (pronounced NIHM and a shortened form of "pseudonym,") is a name invented by or provided for an Internet user in order to conceal the user's real identity and, in some cases, to expressly create a new and separate Internet identity. Among reasons to have and use a "nym" are these:

  • You want to comment or take part in controversial political or other discussions on the Internet without revealing your opinions to colleagues, friends, or employers
  • You want to send spam (unrequested bulk e-mail) without anyone being able to trace it to you
  • You are a self-declared cracker that wants to talk about it without being identified
  • You simply feel strongly about protecting your privacy on the Internet

There are a number of legitimate reasons for communicating anonymously. The example of a battered spouse seeking help in a Usenet news group or a Web site discussion is sometimes cited.

To use a nym instead of your real e-mail name when sending and receiving e-mail, you can use the services of a remailer , a company with a Web server that accepts e-mail from you and forwards it to its destination with a different return address than yours. Incoming mail to your nym is forwarded to your real Internet address. Some remailing services forward mail through several remailers to make it even harder to trace the source of an e-mail note. There are free or public remailer services. Andre Bacard, author of The Anonymous Remailer FAQ and The Computer Privacy Handbook , divides remailers into: (1) PSEUDO- anonymous remailers, who know the names of the people for whom they are providing anonymity service, and (2) more serious anonymous remailers, who never know your name. Bacard believes that, for most people, the PSEUDO-anonymous is sufficient. It's also much easier to use. Most remailer services disallow the use of spam. Remailing is often combined with encryption using Pretty Good Privacy ( PGP ).

Some companies also allow you to surf the Web anonymously by first linking to an intermediary site that in turn connects you to any Web site you select without that site being able to learn anything about you from your request message.

This was last updated in April 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close