Browse Definitions :
Definition

pseudonymity

Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym. In pseudonymous systems, real identities are only available to site administrators.

Pseudonymity allows users to communicate with one and other in a generally anonymous way. Pseudonyms are typically user-chosen names. Pseudonymity helps maintain user privacy and enables free speech without security worries.

Very few sites and services are really anonymous, but there are varying degrees of anonymity. Facebook, for example, requires individuals to use their real names. On some forums and other venues, the user’s pseudonym and IP address may be displayed along with location information, which can make their identity relatively easy to detect.

Anonymity cannot be assured even if only site owners have information that links users to their posts and the identifying information is encrypted. All encryption can be broken, given sufficient time and compute resources. Furthermore, there are so many ways to link users to their true identities that most anonymity on the web can be said to be either pseudonymity or pseudo-anonymity. Pseudo-anonymity contrasts with pseudonymity in that it allows users to post or comment without the use of any type of identifier.

This was last updated in November 2015

Continue Reading About pseudonymity

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close