Skip to main content

Anonymity Challenges in the Internet

  • Chapter
  • First Online:
Anonymization

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

Since information about people acting in the Internet (both, consciously or unconsciously provided by them) can be easily found, surfing on the World Wide Web is far from an anonymous activity of no consequences. With regard to the therewith associated risk of data abuses it is still a debatable point, whether the identification in the online world is essential, and if so to what extent, or whether there is a right to act anonymously within the World Wide Web.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Sect. 1.3.2.2(1)(a).

  2. 2.

    Complete anonymity cannot be guaranteed.

  3. 3.

    Example: According to German law, access providers are only allowed to use stored data for accounting purposes or for eliminating technical barriers.

  4. 4.

    Extensively on the subject of Trojan horses, see Sect. 4.4.

  5. 5.

    In more detail see Sect. 4.4.1.1.

  6. 6.

    Starting in 2008, a group of online activists acting under the synonym “Anonymous” appeared on the scene. In so doing, the name “Anonymous” itself was inspired by the (perceived) anonymity under which Internet participants post images and comments on the Internet. Representing the concept of any and all people as an unnamed collective the members of the group appear in public wearing the Guy Fawkes masks popularized by the comic book and film V for Vendetta. At the beginning, “Anonymous” provided warnings against the Church of Scientology and accomplished protest actions to support the right to freedom of speech and the Internet freedom. Initially acting only within the Internet, the activist meanwhile expanded their protest actions in sectors aside from the Internet. The activists sign their messages with “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”

  7. 7.

    With regard to the fact that on behalf of “Anonymous” both a letter claiming responsibility and a denial was sent the perpetration of “Anonymous” is still unproved. According to the denial letter of December 25, 2011, “Anonymous” strongly condemned the action of being a violence of the freedom of press.

  8. 8.

    In general to the problems of cyberterrorism see Council of Europe (2008).

  9. 9.

    This subchapter is based on Weber and Weber 2010, pp. 47–50.

  10. 10.

    However, anonymizing services do not automatically anonymize the communication’s content.

  11. 11.

    See https://www.torproject.org/; Landau (2010), p. 139/40.

  12. 12.

    Compare for example Anonymizer, Terms of Use, http://www.anonymizer.com/legal/legal, Accessed 12 January 2012.

  13. 13.

    The ONS is a service containing the network addresses of services; for further details see Weber and Weber 2010, p. 6.

  14. 14.

    During the so called “Jasmin Revolution” starting at the end of 2010 in Tunesia and continuing 2011 within the bordering Arab States governments (unsuccessfully) tried to silence the political opposition by shutting down important webpages. However, by using anonymizing services Internet users were able to bend this censorship of the Internet.

References

  • Baeriswyl B (2008) Der Schatten über der Anonymität. Digma 1:4–5

    Google Scholar 

  • Berghel H, Womack K (2003) Anonymizing the net: sanitizing packets for fun and profit. Communications of the ACM 46(4): 15–20. http://delivery.acm.org/10.1145/650000/641220/p15-berghel.pdf?ip=130.60.119.66&acc=ACTIVE%20SERVICE&CFID=62809855&CFTOKEN=52124798&__acm__=1327076953_549d640167b855013cd4ba7bd5ac87e2. Accessed 31 Jan 2012

  • Biegel S (2001) Beyond our control?: confronting the limits of our legal system in the age of cyberspace. MIT press, Cambridge

    Google Scholar 

  • Bono SC, Soghoian CA, Monrose F (2004) Mantis: a lightweight, server-anonymity preserving, searchable P2P network. http://files.dubfire.net/jhu/publications/mantis-tr-b.pdf. Accessed 31 Jan 2012

  • Brunst PW (2009) Anonymität im Internet—rechtliche und tatsächliche Rahmenbedingungen. Duncker and Humblot, Berlin

    Google Scholar 

  • Council of Europe (2008) Cyberterrorism: the use of the internet for terrorist purposes. Council of Europe Publishing, Strasbourg

    Google Scholar 

  • Demut T, Rieke A (2000) Der Rewebber—Anonymität im World Wide Web. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf

    Google Scholar 

  • Edelmann, B (2009) Running out of numbers: scarcity of ip addresses and what to do about it. Working Paper Harvard Business School. http://www.hbs.edu/research/pdf/09-091.pdf. Accessed 31 Jan 2012

  • European Commission (2008) Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions: Advancing the Internet: Action plan for the deployment Internet Protocol version 6 (IPv6) in Europe. COM 2008(313). 27 May 2008. http://ec.europa.eu/information_society/policy/ipv6/docs/european_day/communication_final_27052008_en.pdf. Accessed 31 Jan 2012

  • Freund B, Schnabel C (2011) Bedeutet IPv6 das ende der anonymität im internet? MultiMedia und Recht 8:495–499

    Google Scholar 

  • Froomkin AM (2000) The death of privacy? Stanford Law Rev 52:1461–1543

    Article  Google Scholar 

  • Graham J, Howard R, Olson R (eds) (2011) Cyber security essentials. Auerbach Publications, Boca Raton

    Google Scholar 

  • Holznagel B, Sonntag M (2000) Rechtliche anforderungen an anonymisierungsdienste: das beispiel des janus-projektes der fernuniversität hagen. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf

    Google Scholar 

  • Köhntopp M (2000) Identitätsmanagement—anforderungen aus nutzersicht. In: Sokol B (ed) Datenschutz und anonymität. Toennes Satz + Druck GmbH, Düsseldorf

    Google Scholar 

  • Krause C (2003) Tools für anonymität. In: Bäumler H, von Mutius A (eds) Anonymität im internet. Vieweg, Braunschweig

    Google Scholar 

  • Landau S (2010) Surveillance or Security? The risks posed by new wiretapping technologies. The MIT Press, Cambridge and London

    Google Scholar 

  • Malin B, Sweeney L, Newton E (2003) Trail re-identification: learning who you are from where you have been. LIDAP-WP12. Carnegie Mellon University. Laboratory for International Data Privacy. http://dataprivacylab.org/dataprivacy/projects/trails/paper3.pdf. Accessed 31 Jan 2012

  • Mayrhofer M, Plöcklinger O (2006) Aktuelles zum internetrecht: tagungsband zum symposium internet-recht vom 23. April 2005. Pro Libris, Engerwitzdorf

    Google Scholar 

  • Samuelson P (2000) Privacy as intellectual property? Stanford Law Rev 52:1125–1173

    Article  Google Scholar 

  • Schwartz PM, Solove DJ (2011) The PII problem: privacy and a new concept of personally identifiable information. New York Univ Law Rev 86(6):1814–1894

    Google Scholar 

  • Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven

    Google Scholar 

  • Weber RH (2003) Towards a legal framework for the information society. Schulthess, Zurich

    Google Scholar 

  • Weber RH (2009) Internet governance: regulatory challenges. Schulthess, Zurich

    Google Scholar 

  • Weber RH, Heinrich UI (2011) IP Address allocation through the lenses of public goods and scarce resources theories. scripted 8(1): 69–92. http://www.law.ed.ac.uk/ahrc/script-ed/vol8-1/weber.pdf. Accessed 31 Jan 2012

  • Weber RH, Weber R (2010) Internet of things: legal perspectives. Schulthess, Zurich

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rolf H. Weber .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 The Author(s)

About this chapter

Cite this chapter

Weber, R.H., Heinrich, U.I. (2012). Anonymity Challenges in the Internet. In: Anonymization. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-4066-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4066-5_2

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4065-8

  • Online ISBN: 978-1-4471-4066-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics