Download Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Download Thesis This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Who Are Anonymous? A Study Of Online Activism Collins, Benjamin Thomas Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 01. Oct. 2021 Who Are Anonymous? A Study Of Online Activism Benjamin Thomas Collins King's College London, War Studies 2016 1 Abstract The activist network “Anonymous” has protested and launched cyber-attacks for and against a spectrum of socio-political causes around the world since 2008. The subsequent coverage and debate have described Anonymous but has generally done little to explore their political, cultural and historical contexts. Anonymous are an important development in how we use communications technologies for political means and ends. Their reactionary political positioning and pop-culture imagery from the role of moveable type printing in the Reformation to the Electric Telegraph as a technological and social precursor of the internet. This thesis uses contemporary media coverage of Anonymous’ actions, prior research in the field of “Anonymous Studies” and Anonymous-authored primary source materials to answer these questions of Anonymous’ historical development, motivation and direction. This thesis expands on this central historical narrative through examining Anonymous’ use of pop-culture as political shorthand, how their methods and visual style have been adopted by others; as well as the political, legal and social responses to Anonymous by their targets and the “internet culture” from which they came. Anonymous is a decentralised activist/protest community who define themselves through opposition. Anonymous position themselves as the antithesis of everything their current target is or represents, establishing solidarity and common cause among an otherwise disparate community. This almost always a takes place as a reaction to causes which have already reached a critical mass of mainstream attention. Despite the reduction of Anonymous’ novelty and impact over time, their methods have become templates for conducting aggressive and irregular political actions through the internet. This thesis combines research avenues which have not been directly connected to Anonymous or each other, expanding the small but growing field of “Anonymous Studies,” providing a strong historical and analytical basis for future research. 2 Acknowledgements I would like to thank Dr Thomas Rid, David Betz and Neville Bolt for their supervision across the many iterations of this thesis over the last four years. I would also like to thank Robert Black for the opportunities to present the ideas underpinning this thesis to new and different audiences, an experience which helped to move my efforts in the right direction. Finally I would like to thank Sarah Nichol for giving me perspective, support and the occasional gentle yet firm reminder to unplug from the hive mind every now and again. 3 Table of Contents Glossary of Terms.......................................................................................................................6 Chapter One – Introduction.........................................................................................................7 Research Questions.....................................................................................................10 Methodology...............................................................................................................15 Literature Review........................................................................................................27 Chapter Overview.......................................................................................................41 Chapter Two – From 4chan to Political Mobilisation...............................................................46 4chan and /b/...............................................................................................................47 The growth of proto-Anonymous, /b/-day and the self-fulfilling prophecy...............62 The first digital skirmishes and the formation of proto-Anonymous.........................63 Conclusion..................................................................................................................70 Chapter Three – The Connected Society...................................................................................71 Martin Luther, the Printing Press and the Reformation..............................................74 Copyright, the Church and the fight back for information control.............................80 The proximity of history; the Electric Telegraph, Public Libraries and Facebook.....82 Conclusion..................................................................................................................91 Chapter Four – Project Chanology and Payback......................................................................93 Project Chanology – Anonymous steps into the light.................................................94 The snowballing of Payback and Avenge Assange...................................................109 Conclusion................................................................................................................117 Chapter Five – Anonymous and the Rewiring of Pop-Culture Imagery.................................119 The imagery of Anonymous......................................................................................120 Gunpowder, treason and plot; Anonymous and Guy Fawkes...................................126 The Spectacular Culture Industry and the political re-appropriation loop...............129 The counter-appropriation of Anonymous................................................................141 Conclusion................................................................................................................150 Chapter Six – Serious business and the end of the lulz...........................................................152 Wikileaks, Tunisia and LulzSec................................................................................153 LulzSec.....................................................................................................................161 The end of the Lulz...................................................................................................165 Anonymous and beyond – the Syrian Electronic Army, Lizard Squad and the Fancy Bears.........................................................................................................................175 Conclusion................................................................................................................183 Chapter Seven – The Other Side of the Mask.........................................................................185 The long tail of communications technologies as a political tool.............................185 Anonymous and the legal system.............................................................................190 The International Response to Anonymous..............................................................198 4 “We r legun” - The Internet Responds to Anonymous..............................................207 Conclusion................................................................................................................220 Chapter Eight – Should we continue to expect Anonymous?.................................................222 The broader sphere of digital activism – where does Anonymous fit?.....................223 Post-LulzSec degradation and dilution of attention..................................................227 The Anonymous Paradox..........................................................................................232 Anonymous versus ISIS; a war of perception...........................................................241 Conclusion................................................................................................................255 Chapter Nine – Conclusion.....................................................................................................257 Anonymous – should we continue to expect them?..................................................263 Future Research........................................................................................................281 Bibliography............................................................................................................................283
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • How We Became Legion: Burke's Identification and Anonymous By
    How We Became Legion: Burke's Identification and Anonymous by Débora Cristina Ramos Antunes da Silva A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Arts in English - Rhetoric and Communication Design Waterloo, Ontario, Canada, 2013 © Débora Cristina Ramos Antunes da Silva 2013 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract This thesis presents a study of how identification, according to Kenneth Burke's theory, can be observed in the media-related practices promoted by the cyber-activist collective Anonymous. Identification is the capacity of community-building through the use of shared interests. Burke affirms that, as human beings are essentially social, identification is the very aim of any human interaction. Cyber-activism deeply relies on this capacity to promote and legitimise its campaigns. In the case of Anonymous, the collective became extremely popular and is now a frequent presence even in street protests, usually organised online, around the world. Here, I argue that this power was possible through the use of identification, which helped attract a large number of individuals to the collective. Anonymous was particularly skilled in its capacity to create an ideology for each campaign, which worked well to set up a perfect enemy who should be fought against by any people, despite their demographic or social status. Other forms of identification were also present and important.
    [Show full text]
  • The Impact of Social Media on Students' Lives
    The impact of social media on students’ lives Case: LAB University of Applied Sciences LAB University of Applied Sciences Bachelor of Business Administration, Business Information Technology Spring 2021 My Hanh Nguyen Abstract Author(s) Publication type Completion year Nguyen, My Hanh Thesis, UAS 2021 Number of pages 34 Title of the thesis The impact of social media on students’ lives Case: LAB University of Applied Sciences Degree Business Information Technology Abstract Social media platforms are a ubiquitous part of modern society and the typical student spends many hours each day interacting with them. The purpose and research question of this thesis was to study and analyse the impact of social media on the lives and aca- demic performance of students and to give recommendations on how to avoid the possi- ble negative effects and how to amplify the positives A specific focus was on the foreign students at LAB University of Applied Sciences which functioned as the case company. The study was performed using the qualitative method and utilizing a combination of pri- mary and secondary sources. The main primary source was a series of interviews con- ducted with these aforementioned foreign students. This data was then analysed by the- matic analysis and the results of it were compared with the literary sources. The results showed that social media has both positive and negative effects on the aca- demic performance. It allows for easy communication and can be a great source of infor- mation, but it can also lead to psychological issues such as addiction and falling victim to cyberbullying.
    [Show full text]
  • Social Networking and Digital Gaming Media Convergence: Classification and Its Consequences for Appropriation
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Salford Institutional Repository Social Networking and Digital Gaming Media Convergence: Classification and its Consequences for Appropriation Marie Griffiths, PhD and Ben Light, PhD IS, Organisations and Society Research Centre University of Salford, Maxwell Building, Salford, M5 4WT. United Kingdom. Contact Author: Professor Ben Light IS, Organisations and Society Research Centre University of Salford, Maxwell Building, Salford, M5 4WT. United Kingdom. Tel. +44 161 295 5443 Email. [email protected] Suggested running title: Social Networking and Digital Gaming Convergence Biographies Marie Griffiths moved from the IT industry into academia and is now based at the University of Salford as an EPSRC Academic Fellow. She has, and continues to research gender and ICTs. Recently she has embarked upon the study "Cybercitizens and their Virtual Pursuits" to understand the consequence of growing up and living in a technologically saturated environment. Her work has been published in journals such as Gender, Work and Organization, the European Journal of Information Systems and Information Communication and Society. Ben Light is Professor of Technology and Society at the University of Salford. His research concerns the appropriation of configurable technologies within work, organisations and society. This has led him to explore the use of large-scale enterprise resource planning packages, call centre technologies, social networking sites and digital games. He has published in journals such as Communications of the ACM, Information Systems Journal, New Technology, Work and Employment, the European Journal of Information Systems and the Journal of Information Technology.
    [Show full text]
  • Biting Into Forbidden Fruit
    Biting into the forbidden fruit Lessons from trusting Javascript crypto Krzysztof Kotowicz, OWASP Appsec EU, June 2014 About me • Web security researcher • HTML5 • UI redressing • browser extensions • crypto • I was a Penetration Tester @ Cure53 • Information Security Engineer @ Google Disclaimer: “My opinions are mine. Not Google’s”. Disclaimer: All the vulns are fixed or have been publicly disclosed in the past. Introduction JS crypto history • Javascript Cryptography Considered Harmful http://matasano.com/articles/javascript- cryptography/ • Final post on Javascript crypto http://rdist.root.org/2010/11/29/final-post-on- javascript-crypto/ JS crypto history • Implicit trust in the server to deliver the code • SSL/TLS is needed anyway • Any XSS can circumvent the code • Poor library quality • Poor crypto support • No secure keystore • JS crypto is doomed to fail Doomed to fail? Multiple crypto primitives libraries, symmetric & asymmetric encryption, TLS implementation, a few OpenPGP implementations, and a lot of user applications built upon them. Plus custom crypto protocols. https://crypto.cat/ https://www.mailvelope.com/ http://openpgpjs.org/ JS crypto is a fact • Understand it • Look at the code • Find the vulnerabilities • Analyze them • Understand the limitations and workarounds • Answer the question: can it be safe? JS crypto vulns in the wild • Language issues • Caused by a flaw of the language • Web platform issues • Cased by the web • Other standard bugs • out of scope for this presentation Language issues Language issues matter
    [Show full text]
  • Analyse De Maliciels Sur Android Par L'analyse De La Mémoire Vive
    Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Maîtrise en informatique Maître ès sciences (M. Sc.) Québec, Canada © Bernard Lebel, 2018 Analyse de maliciels sur Android par l’analyse de la mémoire vive Mémoire Bernard Lebel Sous la direction de: Mohamed Mejri, directeur de recherche Résumé Les plateformes mobiles font partie intégrante du quotidien. Leur flexibilité a permis aux développeurs d’applications d’y proposer des applications de toutes sortes : productivité, jeux, messageries, etc. Devenues des outils connectés d’agrégation d’informations personnelles et professionnelles, ces plateformes sont perçues comme un écosystème lucratif par les concepteurs de maliciels. Android est un système d’exploitation libre de Google visant le marché des appareils mobiles et est l’une des cibles de ces attaques, en partie grâce à la popularité de celui- ci. Dans la mesure où les maliciels Android constituent une menace pour les consommateurs, il est essentiel que la recherche visant l’analyse de maliciels s’intéresse spécifiquement à cette plateforme mobile. Le travail réalisé dans le cadre de cette maîtrise s’est intéressé à cette problématique, et plus spécifiquement par l’analyse de la mémoire vive. À cette fin, il a fallu s’intéresser aux tendances actuelles en matière de maliciels sur Android et les approches d’analyses statiques et dynamiques présentes dans la littérature. Il a été, par la suite, proposé d’explorer l’analyse de la mémoire vive appliquée à l’analyse de maliciels comme un complément aux approches actuelles. Afin de démontrer l’intérêt de l’approche pour la plateforme Android, une étude de cas a été réalisée où un maliciel expérimental a été conçu pour exprimer les comportements malicieux problématiques pour la plupart des approches relevées dans la littérature.
    [Show full text]
  • People Are Either Too Fake Or Too Real'': Opportunities And
    Behavior in Online Communities CHI 2017, May 6–11, 2017, Denver, CO, USA “People Are Either Too Fake or Too Real”: Opportunities and Challenges in Tie-Based Anonymity Xiao Ma Nazanin Andalibi Louise Barkhuus Jacobs Institute, Cornell Tech College of Computing and The IT University of New York, NY, USA Informatics, Drexel University Copenhagen [email protected] Philadelphia, PA, USA Copenhagen, Denmark [email protected] [email protected] Mor Naaman Jacobs Institute, Cornell Tech New York, NY, USA [email protected] ABSTRACT affected social interactions and dynamics in offline and on- In recent years, several mobile applications allowed individ- line environments [11, 27]. Anonymity allows people to feel uals to anonymously share information with friends and con- less constrained by the expectations of their everyday iden- tacts, without any persistent identity marker. The functions of tities [3, 25], which in turn allows more candid and honest these “tie-based” anonymity services may be notably differ- self-expressions [1, 43]. Anonymity also leads users to dis- ent than other social media services. We use semi-structured close more information [52], which may result in positive interviews to qualitatively examine motivations, practices and emotional outcomes for the person disclosing [45]. On the perceptions in two tie-based anonymity apps: Secret (now de- other hand, the lack of attribution and responsibility in anony- funct, in the US) and Mimi (in China). Among the findings, mous environments can encourage malicious behaviors such we show that: (1) while users are more comfortable in self- as trolling [33] and cyberbullying [5, 6, 34]. It is no wonder disclosure, they still have specific practices and strategies to that society in general, and HCI researchers in particular, have avoid or allow identification; (2) attempts for de-identification been fascinated with the topic of anonymity.
    [Show full text]
  • Childhood Comes but Once National Strategy to Combat Violence and Sexual Abuse Against Children and Youth (2014–2017)
    Strategy Childhood comes but once National strategy to combat violence and sexual abuse against children and youth (2014–2017) Strategy Childhood comes but once National strategy to combat violence and sexual abuse against children and youth (2014–2017) 4 FOREWORD As a society, Norway has come a long way in its efforts to protect children and adolescents from violence, sexual abuse and bullying. The progress we have achieved is attributable to policy decisions, legislation, increased knowledge, public discussion, media attention and the work of professionals, parents and children themselves. We do not permit parents to harm their children, and we express collective grief and alarm when we hear of children exposed to serious abuse. To the vast majority of parents in Norway, nothing is more important than the well-being of children. All the same, violence and sexual abuse, whether in the family or elsewhere, are a part of daily life for many children. Extensive research shows how consequential violence may be, whether it is directed at a parent or the child itself, and whether it takes the form of direct physical violence, sexual abuse or bullying. Violence can lead to extensive cognitive, social, psychological and physical problems in both the short and long term. Violence against children and adolescents is a public health challenge. The approach to violence and sexual abuse against children in Norwegian society must be one of zero tolerance. We want safety and security for all children, enabling them to enjoy good health and a good quality of life as they grow. Taboos must be broken.
    [Show full text]
  • Jan. 21St Babbage’S Son IBM Antitrust Calculates Jan
    mirror with a $10 cylindrical In his spare time, Starkweather lens. was an avid model railroader. Jan. 21st Babbage’s Son IBM Antitrust Calculates Jan. 21, 1952 The US Department of Justice’s Jan. 21, 1888 (DOJ) filed an antitrust suit Charles Babbage [Dec 26] never against IBM [Feb 14], charging it constructed an Analytical Engine with unlawful restraint of trade, [Dec 23], but his youngest son, and domination of the punch Henry Prevost Babbage (1824- card industry. At the time, IBM 1918), did get around to owned more than 90% of all the building the mill portion (the tabulating machines in the US, arithmetic logic unit) from his and manufactured and sold father’s plans. about 90% of all the cards. On this day, it produced a table Gary Starkweather (2009). A consent decree was issued in of multiples of , complete to 29 Photo by Dcoetzee. CC0. 1956, instructing the company digits, arguably making it the to reduce its share of the market first successful test of a Incredibly, his work generated to a more reasonable 50%. This computer. Over twenty years almost no interest at Webster, was fortuitous timing for Tom later, in April 1910, the results and his manager actually Watson, Jr. [Jan 14] who had just were published in The Monthly threatened to sack anyone who taken over as IBM's CEO; he Notices of the Royal Astronomical 'wasted their time' on the wanted to move the company's Society, followed by errata in the project. focus away from punched card June issue. systems towards computers.
    [Show full text]
  • The Influence of Anonymity on Participation in Online Communities
    Thèse de doctorat de l’UTT Malte PASKUDA The Influence of Anonymity on Participation in Online Communities Spécialité : Ingénierie Sociotechnique des Connaissances, des Réseaux et du Développement Durable 2016TROY0033 Année 2016 THESE pour l’obtention du grade de DOCTEUR de l’UNIVERSITE DE TECHNOLOGIE DE TROYES Spécialité : INGENIERIE SOCIOTECHNIQUE DES CONNAISSANCES, DES RESEAUX ET DU DEVELOPPEMENT DURABLE présentée et soutenue par Malte PASKUDA le 24 octobre 2016 The Influence of Anonymity on Participation in Online Communities JURY M. M. BAKER DIRECTEUR DE RECHERCHE CNRS Président (Rapporteur) Mme N. GAUDUCHEAU MAITRE DE CONFERENCES Examinateur Mme M. LEWKOWICZ PROFESSEUR DES UNIVERSITES Directeur de thèse M. M. PRILLA PROFESSOR Rapporteur M. M. ROHDE DOKTOR Examinateur Acknowledgements Myriam Lewkowicz Michael Baker Michael Prilla Nadia Gauducheau Markus Rohde Michel Marcoccia Valentin Berthou Matthieu Tixier Hassan Atifi Ines Di Loreto Karine Lan Lorraine Tosi Aurlien Bruel Khuloud Abou Amsha Josslyn Beltran Madrigal Les membres de lquipe Tech-CICO et les membres du projet TOPIC trouvent ici mes remerciements les plus sincres. Abstract This work presents my PhD thesis about the influence of anonymity on par- ticipation in online environments. The starting point of this research was the observation of the design process of an online platform for informal caregivers. I realized that there is no knowledge about the practical effects that an anony- mous identity system would have. This thesis contains the subsequent literature review, which has been synthesized into a model that shows which participation factors might be influenced by anonymity. Three studies on existing online en- vironments have been conducted: One on Youtube, where there was a change in the comment system forbidding anonymous comments; one on Quora, where users can choose to answer questions anonymously; and one on Hacker News, where users choose how many identity factors they want to present and which name they use.
    [Show full text]
  • View Final Report (PDF)
    TABLE OF CONTENTS TABLE OF CONTENTS I EXECUTIVE SUMMARY III INTRODUCTION 1 GENESIS OF THE PROJECT 1 RESEARCH QUESTIONS 1 INDUSTRY SITUATION 2 METHODOLOGY 3 GENERAL COMMENTS ON INTERVIEWS 5 APT1 (CHINA) 6 SUMMARY 7 THE GROUP 7 TIMELINE 7 TYPOLOGY OF ATTACKS 9 DISCLOSURE EVENTS 9 APT10 (CHINA) 13 INTRODUCTION 14 THE GROUP 14 TIMELINE 15 TYPOLOGY OF ATTACKS 16 DISCLOSURE EVENTS 18 COBALT (CRIMINAL GROUP) 22 INTRODUCTION 23 THE GROUP 23 TIMELINE 25 TYPOLOGY OF ATTACKS 27 DISCLOSURE EVENTS 30 APT33 (IRAN) 33 INTRODUCTION 34 THE GROUP 34 TIMELINE 35 TYPOLOGY OF ATTACKS 37 DISCLOSURE EVENTS 38 APT34 (IRAN) 41 INTRODUCTION 42 THE GROUP 42 SIPA Capstone 2020 i The Impact of Information Disclosures on APT Operations TIMELINE 43 TYPOLOGY OF ATTACKS 44 DISCLOSURE EVENTS 48 APT38 (NORTH KOREA) 52 INTRODUCTION 53 THE GROUP 53 TIMELINE 55 TYPOLOGY OF ATTACKS 59 DISCLOSURE EVENTS 61 APT28 (RUSSIA) 65 INTRODUCTION 66 THE GROUP 66 TIMELINE 66 TYPOLOGY OF ATTACKS 69 DISCLOSURE EVENTS 71 APT29 (RUSSIA) 74 INTRODUCTION 75 THE GROUP 75 TIMELINE 76 TYPOLOGY OF ATTACKS 79 DISCLOSURE EVENTS 81 COMPARISON AND ANALYSIS 84 DIFFERENCES BETWEEN ACTOR RESPONSE 84 CONTRIBUTING FACTORS TO SIMILARITIES AND DIFFERENCES 86 MEASURING THE SUCCESS OF DISCLOSURES 90 IMPLICATIONS OF OUR RESEARCH 92 FOR PERSISTENT ENGAGEMENT AND FORWARD DEFENSE 92 FOR PRIVATE CYBERSECURITY VENDORS 96 FOR THE FINANCIAL SECTOR 96 ROOM FOR FURTHER RESEARCH 97 ACKNOWLEDGEMENTS 98 ABOUT THE TEAM 99 SIPA Capstone 2020 ii The Impact of Information Disclosures on APT Operations EXECUTIVE SUMMARY This project was completed to fulfill the including the scope of the disclosure and capstone requirement for Columbia Uni- the disclosing actor.
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]