This article was written for 'Wired' magazine, and titled 'The Anonymous Net'; it explores identity within an internet setting, highlighting concerns and offering information on 'Identity 2.0', a new wave of internet security. The article was written to accompany my dissertation which explored and researched the topic in depth, and all artwork and layout accompanying the text were produced by myself.
Original Title
Article for 'Wired' Magazine- ''the Anonymous Net' PDF
This article was written for 'Wired' magazine, and titled 'The Anonymous Net'; it explores identity within an internet setting, highlighting concerns and offering information on 'Identity 2.0', a new wave of internet security. The article was written to accompany my dissertation which explored and researched the topic in depth, and all artwork and layout accompanying the text were produced by myself.
This article was written for 'Wired' magazine, and titled 'The Anonymous Net'; it explores identity within an internet setting, highlighting concerns and offering information on 'Identity 2.0', a new wave of internet security. The article was written to accompany my dissertation which explored and researched the topic in depth, and all artwork and layout accompanying the text were produced by myself.
So I told her: ‘My names Mark, I’m 26 observation experiment in the form of To what extent do we and years old and living in Bristol, and I questionnaires showed that the should we trust identity online? work as a journalist’. She seemed respondents (who were regular internet impressed. users) did coincide. “ANY GIRLS wanna p/m me?” In Except my name isn’t Mark, I’m However further answers did not cyber speak p/m translates to ‘personal not 26 years old and I don’t live in support this, where participants message’, which involves a Bristol; in fact I’m not even male and admitted to having virtual friends conversation with somebody from a yet she never once questioned me. So whom they knew only on the internet, chat room but in a sub room outside of why would I lie? and the majority trusted that these the initial vicinity between only two People lie about their identity all friends were ‘who they said they are’ persons. over the net for reasons ranging from a online, exactly as the participant in the Its hard work being a bloke on the bit of fun to those who have malicious observation showed no signs of either net: not only did no girls want to p/m intent. In this instance the girl in the not believing, or being wary of ‘Mark’ me but they didn’t seem to want me to chat room was unwittingly partaking in and his identity. p/m them either. After several an experiment which intended to prove It was obvious from talking with thwarted attempts, I came across a how, when some sort of rapport or her that she was articulate and young woman who went by the chat trust is established online the intelligent (she was majoring in name of ‘chubbygirl’. participant is likely to have little Political Science) and considered We got talking; I asked her the concern for and display extensive herself a feminist; her only downfall usual questions- a/s/l (age/sex/location) naivety regarding their identity. was that she was too trustworthy, and which were met with clear cut Examples of identity fraud online not unlike a lot of internet users. answers- in fact despite being in a UK include ‘phishing’ emails, whereby a Fortunately for her I had no desire to chat room, it turned out she was from person sets up a fake company use or exploit any of the identifying the US, New York: in her own words (impersonating for example a bank or information she had given me; in fact it she said she was “tired of talking to charity) to collect details from was deemed unethical to even include crazy American's”. This already gave unsuspecting web users (usually bank it in the research write up, however us some common ground- I had just account details). It is also common for other people who lie about their come back from a trip to New York so paedophiles to use the net as a means identity online in order to gain there would be plenty to talk about. to establish and gain trust in order to personal details from unsuspecting I proceeded to ask her some further groom children into believing the false strangers do so of an un-benevolent questions and soon established her real identity they assume. nature with the explicit intention to name, age and birthday, marital and A study by Infosecurity revealed exploit or use these details for their family status and siblings, where she that a staggering 92% of 200 people own gain. lived and worked in New York, the surveyed were willing to part with all Many questionnaire participants university she attended and the courses the personal information necessary to also admitted themselves that they do, she was taking, where she liked to steal their identity, simply with the or have in the past lied about or at least spend her spare time and her interests incentive to win a theatre ticket. embellished the truth regarding their and musical tastes. After a while it One would assume that most people identity, yet the general vibe was that became apparent that she knew very would agree that these statistics are of ‘I could see why others would fall little about me and subsequently she quite shocking, and supplementary for it, but I wouldn’t’, which the asked a similar set of questions. research to accompany the online observation rapidly disproved. So why is it that many of us lie This will eradicate the need to give about our identity yet are so quick to our personal information to multitudes “Identity 2.0 aims to believe and trust others? of unknown companies, however many provide a single Addressing the first question, the web users are sceptic as regards all of fact that many people lie about their their information having to be identity online, identities online is predominantly surrendered at all, and because it is a which will verify because they can. The internet is the relatively new development in identity who we say we are” one medium of communication which online, most people are currently allows for freedom of identity or unaware and would therefore be unable complete anonymity whereby we can to make an informed decision as to present ourselves in the light that we whether they are in favour or not. choose as opposed to that which is Single sign- on identities include assigned to us. Sxip, Yadis, Microsoft’s ‘Net Where in real life we are Passport’ (which failed but is currently represented by legal documents such as being recreated), Higgins, inames and passport, drivers licence, medial card LID. It is also a collective concern that etc which detail exactly who we are a single and controlled identity on the according to the government or state; net would merely encompass yet online it is we who pull the strings and another form of big brother- where our dictate which aspects of our every move could be watched and boundaries of time and space to bring personality we choose to show and logged and passed on to others us a medium whereby we can those we wish to camouflage. regardless of whether we are behaving communicate so closely and yet from However, it seems that perhaps the in a responsible manner. Yet the an infinite distance, but it must be born choice to withhold identity information purpose of Identity 2.0 is to tighten in mind how the internet also provides will be made for us and come in the security, not to put people at further the ultimate tool of manipulation in form of ‘Identity 2.0’. Identity 2.0 aims risk; however it is easy to see why the gaining details about us which most to provide a single identity online, public would be sceptic. Nevertheless people would never give out to a total which will verify that we are who we it all boils down the deliberation that stranger in a similar ‘real life’ scenario. say we are, similar to a real life when monitoring identity on the net, Which is what it all boils down to: an document for example a passport, unfortunately it is difficult to police online identity is not assigned the same which can confirm our identities when one area without policing the others importance as or even considered an travelling to different countries, or and ultimately it would need to be extension of- our real life identities, simply buying alcohol in the off- decided that the bad aspects of identity but one unto itself to which the licence. online outweigh the good in order for significance is not realised until it is Identity 2.0 to fall into common place. too late and the information cannot be So it seems restored. that until a People are not necessarily who they concrete, say they are- if you don’t have solid reliable form proof then don’t trust on instinct. We of Identity 2.0 would all like to believe that we can is trusted and trust others but this is not always the used by the case; within an hour of talking, majority we ‘chubbygirl’ genuinely thought she had must all keep met the perfect man, stating that she our wits about ‘could not believe’ how well I knew us on the web; women, obviously not for one minute to by all envisaging that I was more ‘in touch means enjoy with my feminine side’ than she could the freedom ever have imagined! that cyberspace If when we are online, we expect to brings, be able to trust other people, then we overcoming the must behave in a trustworthy manner geographical ourselves, and that means of course that if ‘chubbygirl’ actually turned out “My names Mark, I’m 26 to be a gay Bristolian man then ‘Mark’ would be in a lot of trouble! However years old and living in considering I’m not planning to chat Bristol, and I work as a up any more American women on the journalist” net in the foreseeable future, for the time being I think he’s pretty safe! ●