Search results
Results from the WOW.Com Content Network
Anonymity is directly related to the concept of obscurantism or pseudonymity, where an artist or a group attempts to remain anonymous, for various reasons such as adding an element of mystique to themselves or their work, attempting to avoid what is known as the "cult of personality" or hero worship (in which the charisma, good looks, wealth or ...
An anonymous post, is an entry on a textboard, anonymous bulletin board system, or other discussion forums like Internet forum, without a screen name or more commonly by using a non-identifiable pseudonym. Some online forums such as Slashdot do not allow such posts, requiring users to be registered either under their real name or utilizing a ...
Through online engagement, because of the smoke screen of anonymity, it allows a person to be able to socially interact with strangers in a much more personal way. [52]: 69 This personal connection the consumer feels translates to how they want to establish relationships online. They separate what is commercial or spam and what is relational.
As an editor on Wikipedia, you will have a choice: You can let everyone know who you are by using your real name. Or you can make your edits with a pseudonym, making your true identity more difficult to ascertain. Hoping to remain anonymous is your right. But there are ways in which your identity can be revealed, even if you do not wish.
Anonymous social media is a subcategory of social media wherein the main social function is to share and interact around content and information anonymously on mobile and web-based platforms. [1] Another key aspect of anonymous social media is that content or information posted is not connected with particular online identities or profiles.
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. [1] Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants. [2]
Multiple proposals have been made [36] [citation needed] to build an identity management infrastructure into the Web protocols. All of them require an effective public key infrastructure so that the identity of two separate manifestations of an online identity (say, one on Wikipedia and another on Twitter) are probably one and the same.