Browse Definitions :
Definition

pseudonymity

Contributor(s): Matthew Haughn

Pseudonymity is the near-anonymous state in which a user has a consistent identifier that is not their real name: a pseudonym. In pseudonymous systems, real identities are only available to site administrators.

Pseudonymity allows users to communicate with one and other in a generally anonymous way. Pseudonyms are typically user-chosen names. Pseudonymity helps maintain user privacy and enables free speech without security worries.

Very few sites and services are really anonymous, but there are varying degrees of anonymity. Facebook, for example, requires individuals to use their real names. On some forums and other venues, the user’s pseudonym and IP address may be displayed along with location information, which can make their identity relatively easy to detect.

Anonymity cannot be assured even if only site owners have information that links users to their posts and the identifying information is encrypted. All encryption can be broken, given sufficient time and compute resources. Furthermore, there are so many ways to link users to their true identities that most anonymity on the web can be said to be either pseudonymity or pseudo-anonymity. Pseudo-anonymity contrasts with pseudonymity in that it allows users to post or comment without the use of any type of identifier.

This was last updated in November 2015

Continue Reading About pseudonymity

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close