Abstract
Since information about people acting in the Internet (both, consciously or unconsciously provided by them) can be easily found, surfing on the World Wide Web is far from an anonymous activity of no consequences. With regard to the therewith associated risk of data abuses it is still a debatable point, whether the identification in the online world is essential, and if so to what extent, or whether there is a right to act anonymously within the World Wide Web.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Complete anonymity cannot be guaranteed.
- 3.
Example: According to German law, access providers are only allowed to use stored data for accounting purposes or for eliminating technical barriers.
- 4.
Extensively on the subject of Trojan horses, see Sect. 4.4.
- 5.
In more detail see Sect. 4.4.1.1.
- 6.
Starting in 2008, a group of online activists acting under the synonym “Anonymous” appeared on the scene. In so doing, the name “Anonymous” itself was inspired by the (perceived) anonymity under which Internet participants post images and comments on the Internet. Representing the concept of any and all people as an unnamed collective the members of the group appear in public wearing the Guy Fawkes masks popularized by the comic book and film V for Vendetta. At the beginning, “Anonymous” provided warnings against the Church of Scientology and accomplished protest actions to support the right to freedom of speech and the Internet freedom. Initially acting only within the Internet, the activist meanwhile expanded their protest actions in sectors aside from the Internet. The activists sign their messages with “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”
- 7.
With regard to the fact that on behalf of “Anonymous” both a letter claiming responsibility and a denial was sent the perpetration of “Anonymous” is still unproved. According to the denial letter of December 25, 2011, “Anonymous” strongly condemned the action of being a violence of the freedom of press.
- 8.
In general to the problems of cyberterrorism see Council of Europe (2008).
- 9.
This subchapter is based on Weber and Weber 2010, pp. 47–50.
- 10.
However, anonymizing services do not automatically anonymize the communication’s content.
- 11.
See https://www.torproject.org/; Landau (2010), p. 139/40.
- 12.
Compare for example Anonymizer, Terms of Use, http://www.anonymizer.com/legal/legal, Accessed 12 January 2012.
- 13.
The ONS is a service containing the network addresses of services; for further details see Weber and Weber 2010, p. 6.
- 14.
During the so called “Jasmin Revolution” starting at the end of 2010 in Tunesia and continuing 2011 within the bordering Arab States governments (unsuccessfully) tried to silence the political opposition by shutting down important webpages. However, by using anonymizing services Internet users were able to bend this censorship of the Internet.
References
Baeriswyl B (2008) Der Schatten über der Anonymität. Digma 1:4–5
Berghel H, Womack K (2003) Anonymizing the net: sanitizing packets for fun and profit. Communications of the ACM 46(4): 15–20. http://delivery.acm.org/10.1145/650000/641220/p15-berghel.pdf?ip=130.60.119.66&acc=ACTIVE%20SERVICE&CFID=62809855&CFTOKEN=52124798&__acm__=1327076953_549d640167b855013cd4ba7bd5ac87e2. Accessed 31 Jan 2012
Biegel S (2001) Beyond our control?: confronting the limits of our legal system in the age of cyberspace. MIT press, Cambridge
Bono SC, Soghoian CA, Monrose F (2004) Mantis: a lightweight, server-anonymity preserving, searchable P2P network. http://files.dubfire.net/jhu/publications/mantis-tr-b.pdf. Accessed 31 Jan 2012
Brunst PW (2009) Anonymität im Internet—rechtliche und tatsächliche Rahmenbedingungen. Duncker and Humblot, Berlin
Council of Europe (2008) Cyberterrorism: the use of the internet for terrorist purposes. Council of Europe Publishing, Strasbourg
Demut T, Rieke A (2000) Der Rewebber—Anonymität im World Wide Web. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf
Edelmann, B (2009) Running out of numbers: scarcity of ip addresses and what to do about it. Working Paper Harvard Business School. http://www.hbs.edu/research/pdf/09-091.pdf. Accessed 31 Jan 2012
European Commission (2008) Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions: Advancing the Internet: Action plan for the deployment Internet Protocol version 6 (IPv6) in Europe. COM 2008(313). 27 May 2008. http://ec.europa.eu/information_society/policy/ipv6/docs/european_day/communication_final_27052008_en.pdf. Accessed 31 Jan 2012
Freund B, Schnabel C (2011) Bedeutet IPv6 das ende der anonymität im internet? MultiMedia und Recht 8:495–499
Froomkin AM (2000) The death of privacy? Stanford Law Rev 52:1461–1543
Graham J, Howard R, Olson R (eds) (2011) Cyber security essentials. Auerbach Publications, Boca Raton
Holznagel B, Sonntag M (2000) Rechtliche anforderungen an anonymisierungsdienste: das beispiel des janus-projektes der fernuniversität hagen. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf
Köhntopp M (2000) Identitätsmanagement—anforderungen aus nutzersicht. In: Sokol B (ed) Datenschutz und anonymität. Toennes Satz + Druck GmbH, Düsseldorf
Krause C (2003) Tools für anonymität. In: Bäumler H, von Mutius A (eds) Anonymität im internet. Vieweg, Braunschweig
Landau S (2010) Surveillance or Security? The risks posed by new wiretapping technologies. The MIT Press, Cambridge and London
Malin B, Sweeney L, Newton E (2003) Trail re-identification: learning who you are from where you have been. LIDAP-WP12. Carnegie Mellon University. Laboratory for International Data Privacy. http://dataprivacylab.org/dataprivacy/projects/trails/paper3.pdf. Accessed 31 Jan 2012
Mayrhofer M, Plöcklinger O (2006) Aktuelles zum internetrecht: tagungsband zum symposium internet-recht vom 23. April 2005. Pro Libris, Engerwitzdorf
Samuelson P (2000) Privacy as intellectual property? Stanford Law Rev 52:1125–1173
Schwartz PM, Solove DJ (2011) The PII problem: privacy and a new concept of personally identifiable information. New York Univ Law Rev 86(6):1814–1894
Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven
Weber RH (2003) Towards a legal framework for the information society. Schulthess, Zurich
Weber RH (2009) Internet governance: regulatory challenges. Schulthess, Zurich
Weber RH, Heinrich UI (2011) IP Address allocation through the lenses of public goods and scarce resources theories. scripted 8(1): 69–92. http://www.law.ed.ac.uk/ahrc/script-ed/vol8-1/weber.pdf. Accessed 31 Jan 2012
Weber RH, Weber R (2010) Internet of things: legal perspectives. Schulthess, Zurich
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 The Author(s)
About this chapter
Cite this chapter
Weber, R.H., Heinrich, U.I. (2012). Anonymity Challenges in the Internet. In: Anonymization. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-4066-5_2
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4066-5_2
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4065-8
Online ISBN: 978-1-4471-4066-5
eBook Packages: Computer ScienceComputer Science (R0)