Browse Definitions :
Definition

pseudo-anonymity

Pseudo-anonymity is the appearance – but not the reality--of anonymity online.

Most commonly, pseudo-anonymity enables anonymous posting and commenting. Pseudo-anonymous users have no visible identifier, and information that can be linked to them is only available to service providers or site administrators (unless the users themselves provide such information in their messages). However, that doesn't mean that messages can't be traced back to their sources. Users are generally required to provide some form of ID for sign up and IP addresses are typically logged and saved.

Many sites or services that allow anonymous posting stipulate that the administrators can provide police with user IP addresses, GPS coordinates, device details and data and time for each message if supported by a search warrant, court order or subpoena. Some sites also make user info available to other businesses and advertisers.

While pseudo-anonymity can be good for civil liberties, privacy and security, some users may exploit it to be abusive to other users or to vandalize sites. On truly anonymous sites, such behavior can be hard to regulate as users can return almost indefinitely. On pseudo-anonymous sites, however, administrators have access to information that can be used to ban users and keep them from returning.

Pseudoanonymity is related to pseudonymity, the more commonly seen system, in which users are identified by something other than their actual names.

See also: Pseudonymous profile

This was last updated in November 2015

Continue Reading About pseudo-anonymity

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close