concealment writes: "The bill, called the Internet Posting Removal Act, is sponsored by Illinois state Sen. Ira Silverstein. It states that a “web site administrator upon request shall remove any comments posted on his or her web site by an anonymous poster unless the anonymous poster agrees to attach his or her name to the post and confirms that his or her IP address, legal name, and home address are accurate.”
The bill, which does not ask for or clarify requirements from entities requesting the comment removal, would take effect 90 days after becoming law."
concealment writes: "There are two main arguments about anonymity when applied to sexual offences that are increasingly entering the public debate. The first is that it's not really possible to protect or prosecute it in our wired world, nor is it feasible to expect authorities with limited resources to police the internet; the second that it is an outdated notion anyway, and that it is a freedom of speech issue to deny anyone the right to criticise or demean another person. Witness Naomi Wolf calling for the women who have accused Julian Assange to be named: he's famous, so why shouldn't they be, seems to be the argument. It isn't a huge leap from this to those who question why Evans is damned as a rapist (although currently appealing against his six-year sentence) while a woman too drunk to give consent remains anonymous.
These are new and complicated issues, but that is no excuse for the surprising amount of wrongheadedness they have prompted. And this isn't just an argument down the pub – the government itself tried to extend anonymity to the accused in sexual offence cases and has shown no desire to do anything about how authorities could go about policing the internet. Fortunately, Keir Starmer, the director of public prosecutions, believes this is possible and recently issued guidelines on prosecuting offences online, hoping to bring about a step change in the perception that online bullying or victimisation isn't really bullying at all."
concealment writes: "Matching a user's mobility trace to their identity "can provide information about habits, interests and activities—or anomalies to them—which in turn may be exploited for illicit gain via theft, blackmail, or even physical violence," stated the research. It's worth a read to see how the researchers used Wi-Fi hotspots on a university campus, captured chats via instant messengers, as well as Bluetooth connectivity to show inter-user correlations. In these social network side channel attacks, they were able to strip out privacy and deanonymize users via their mobility traces with an accuracy of 80%. And this flyer claimed that the "proposed algorithms to quantify information released in location traces, using social networks as a side-channel, are within 90% of the optimal.""
concealment writes: "Using off-the-shelf facial recognition software and simple Internet data mining techniques, Acquisti says he's proven that most people can now be identified simply through a photograph of their face — and anyone can do the sleuthing. In other words, our faces have become our identities, and there little hope of remaining anonymous in a world where billions of photographs are taken and posted online every month."