Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged Anonymity

Rss Feed Group items tagged

Weiye Loh

BBC News - Belle de Jour's history of anonymity - 1 views

  •  
    "Anon was, as Virginia Woolf noted in one of her final unpublished essays, "the voice that broke the silence of the forest". Elsewhere she suggested that "Anonymous was a woman". For anonymity has definitely been widely used by women throughout the ages, whether they're writing about relationships, sex or anything else. Without Anonymous, there are so many classics we would not have had - Gawain and the Green Knight, virtually all of the Bible and other religious texts. Anon is allowed a greater creative freedom than a named writer is, greater political influence than a common man can ever attain, and far more longevity than we would guess. Obviously, I'm a great fan of Anon's work, but then, as a formerly anonymous author, I would say that, wouldn't I?"
  •  
    Perhaps in intentionally adopting anonymity she seeks to represent herself as everywoman; it is not the individual and what (s)he does which matters, but the "type" which has been/is being (per)formed (Can I just say also that as a result of this she implies all females seek such outlets for expression? i.e. whoring themselves (literally or otherwise). All idea of submission seems to be inherent in their nature, however much they protest and rail against it - HYPOCRISY). By removing the source (i.e. the author's name), the focus is on the words and actions (which should it not be?). Regarding anonymity and creative freedom, the lack of burden of responsibility frees writers from having to conform to any roles which may be ascribed to them by virtue of their "place".
Weiye Loh

God hates hackers: Anonymous warns Westboro Baptist Church, 'stop now, or else' - 0 views

  • Vigilante “hacktivist” group Anonymous has a new target: Westboro Baptist Church. In an open letter to the notorious Kansas-based church, Anonymous promises “vicious” retaliation against the organization if they do not “cease & desist” their protest activities.
  • Led by pastor Fred Phelps, Westboro Baptist has become infamous for picketing the funerals of US soldiers — events know as “Love Crusades” — and for their display of signs bearing inflammatory messages, like “God hates fags.” The church has long argued that their Constitutionally-protected right to freedom of speech allows them to continue their derogatory brand of social activism.
  • Anonymous also considers itself an “aggressive proponent” of free speech, having recently launched attacks on organizations they consider to be enemies of that right: Companies like PayPal, Visa and Master Card, who stopped processing donations to WikiLeaks after the anti-secrecy organization released a massive cache of US embassy cables; and the government of Egypt, which attempted to cut off its
  • ...1 more annotation...
  • Other Anonymous targets include the Church of Scientology and, most recently, cyber-security company HBGary, which attempted to infiltrate Anonymous. In response, the lose-knit hacker group released 71,800 HBGary emails, which revealed highly dubious activities by the company, almost instantaneously destroying HBGary’s reputation and potentially setting it on a path to financial ruin.
Weiye Loh

Anonymous speaks: the inside story of the HBGary hack - 0 views

  • It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.
  • When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.
  • HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. On the software side, HBGary has a range of computer forensics and malware analysis tools to enable the detection, isolation, and analysis of worms, viruses, and trojans. On the services side, it offers expertise in implementing intrusion detection systems and secure networking, and performs vulnerability assessment and penetration testing of systems and software. A variety of three letter agencies, including the NSA, appeared to be in regular contact with the HBGary companies, as did Interpol, and HBGary also worked with well-known security firm McAfee. At one time, even Apple expressed an interest in the company's products or services.
  • ...1 more annotation...
  • One might think that such an esteemed organization would prove an insurmountable challenge for a bunch of disaffected kids to hack. World-renowned, government-recognized experts against Anonymous? HBGary should be able to take their efforts in stride. Unfortunately for HBGary, neither the characterization of Anonymous nor the assumption of competence on the security company's part are accurate, as the story of how HBGary was hacked will make clear. Anonymous is a diverse bunch: though they tend to be younger rather than older, their age group spans decades. Some may still be in school, but many others are gainfully employed office-workers, software developers, or IT support technicians, among other things. With that diversity in age and experience comes a diversity of expertise and ability.
Weiye Loh

Response to Guardian's Article on Singapore Elections | the kent ridge common - 0 views

  • Further, grumblings on Facebook accounts are hardly ‘anonymous’. Lastly, how anonymous can bloggers be, when every now and then a racist blogger gets arrested by the state? Think about it. These sorts of cases prove that the state does screen, survey and monitor the online community, and as all of us know there are many vehement anti-PAP comments and articles, much of which are outright slander and defamation.
  • Yet at the end of the day, it is the racist blogger, not the anti-government or anti-PAP blogger that gets arrested. The Singaporean model is a much more complex and sophisticated phenomenon than this Guardian writer gives it credit.
  • Why did this Guardian writer, anyway, pander to a favourite Western stereotype of that “far-off Asian undemocratic, repressive regime”? Is she really in Singapore as the Guardian claims? (“Kate Hodal in Singapore” is written at the top) Can the Guardian be anymore predictable and trite?
  • ...1 more annotation...
  • Can any Singaporean honestly say the she/he can conceive of a fellow Singaporean setting himself or herself on fire along Orchard Road or Shenton Way, as a result of desperate economic pressures or financial constraints? Can we even fathom the social and economic pressures that mobilized a whole people to protest and overthrow a corrupt, US-backed regime? (that is, not during elections time) Singapore has real problems, the People’s Action Party has its real problems, and there is indeed much room for improvement. Yet such irresponsible reporting by one of the esteemed newspapers from the UK is utterly disappointing, not constructive in the least sense, and utterly misrepresents our political situation (and may potentially provoke more irrationality in our society, leading people to ‘believe’ their affinity with their Arab peers which leads to more radicalism).
  •  
    Further, grumblings on Facebook accounts are hardly 'anonymous'. Lastly, how anonymous can bloggers be, when every now and then a racist blogger gets arrested by the state? Think about it. These sorts of cases prove that the state does screen, survey and monitor the online community, and as all of us know there are many vehement anti-PAP comments and articles, much of which are outright slander and defamation. Yet at the end of the day, it is the racist blogger, not the anti-government or anti-PAP blogger that gets arrested. The Singaporean model is a much more complex and sophisticated phenomenon than this Guardian writer gives it credit.
Jianwei Tan

Banksy, Vandalism & Copyright - 3 views

http://peteashton.com/2006/10/infringing_the_bankster/ I came across this story some time back when Banksy's works were more popular. Banksy is the handle used by an anonymous graffiti artist in E...

Banksy Graffiti Vandalism Copyright Art England

started by Jianwei Tan on 25 Aug 09 no follow-up yet
Weiye Loh

Twitter unmasks anonymous British user in landmark legal battle | Technology | The Guar... - 0 views

  • Giggs brought the lawsuit at the high court in London and the move to use California courts is likely to be seen as a landmark moment in the internet privacy battle.Ahmed Khan, the south Tyneside councillor accused of being the author of the pseudonymous Twitter accounts, described the council's move as "Orwellian". Khan received an email from Twitter earlier this month informing him that the site had handed over his personal information. He denies being the author of the allegedly defamatory material.
  • Khan said the information Twitter handed over was "just a great long list of numbers". The subpeona ordered Twitter to hand over 30 pieces of information relating to several Twitter accounts, including @fatcouncillor and @ahmedkhan01."I don't fully understand it but it all relates to my Twitter account and it not only breaches my human rights, but it potentially breaches the human rights of anyone who has ever sent me a message on Twitter.
  • He added: "I was never even told they were taking this case to court in California. The first I heard was when Twitter contacted me. I had just 14 days to defend the case and I was expected to fly 6,000 miles and hire my own lawyer – all at my expense."Even if they unmask this blogger, what does the council hope to achieve ? The person or persons concerned is simply likely to declare bankruptcy and the council won't recover any money it has spent."
Jun Jie Tan

Shorter, Fatter, Balder: Men's misleading online profiles - 0 views

  •  
    Ethical problem Anonymity affords men whom are not confident of themselves to mislead women on dating sites with pictures of someone more attractive. This leads to general loss of trust, security and expectation in the online dating landscape. Ethical question Although men would eventually disappoint the women when they meet offline, they almost always "misrepresent" themselves and inflate their personalities online. Shouldn't there be a limit to impression management, be it community-based sanction or government regulation?
Weiye Loh

Anonymous speaks: the inside story of the HBGary hack - 0 views

  • The attackers just needed a little bit more information: they needed a regular, non-root user account to log in with, because as a standard security procedure, direct ssh access with the root account is disabled. Armed with the two pieces of knowledge above, and with Greg's e-mail account in their control, the social engineers set about their task. The e-mail correspondence tells the whole story: From: Greg To: Jussi Subject: need to ssh into rootkit im in europe and need to ssh into the server. can you drop open up firewall and allow ssh through port 59022 or something vague? and is our root password still 88j4bb3rw0cky88 or did we change to 88Scr3am3r88 ? thanks
  • Thanks indeed. To be fair to Jussi, the fake Greg appeared to know the root password and, well, the e-mails were coming from Greg's own e-mail address. But over the course of a few e-mails it was clear that "Greg" had forgotten both his username and his password. And Jussi handed them to him on a platter. Later on, Jussi did appear to notice something was up: From: Jussi To: Greg Subject: Re: need to ssh into rootkit did you open something running on high port?
  • From: Jussi To: Greg Subject: Re: need to ssh into rootkit hi, do you have public ip? or should i just drop fw? and it is w0cky - tho no remote root access allowed
  • ...2 more annotations...
  • So there are clearly two lessons to be learned here. The first is that the standard advice is good advice. If all best practices had been followed then none of this would have happened. Even if the SQL injection error was still present, it wouldn't have caused the cascade of failures that followed.
  • The second lesson, however, is that the standard advice isn't good enough. Even recognized security experts who should know better won't follow it. What hope does that leave for the rest of us?
Weiye Loh

Unhappy meal: Data retention bill could lure sex predators into McDonalds, libraries - 0 views

  • mandatory data retention legislation. The bill that they have proposed requires that Internet Service Providers, such as Comcast and Time Warner, save records of the IP addresses they assign to their customers for a period of 18 months.
  • Data retention is a controversial topic and loudly opposed by the privacy community. To counter such criticism, the bill's authors have cunningly (and shamelessly) named it the Protecting Children from Internet Pornographers Act of 2011. This of course means that anyone who opposes data retention must go on record as opposing measures to catch sexual predators.
  • The bill includes a curious exception to the retention requirements: it doesn't apply to wireless data providers, such as AT&T and Verizon, or operators of public WiFi networks, such as Starbucks and McDonalds. When questioned about this, a Republican committee staffer told CNET in May that the wireless loophole was added because wireless networks are designed in such a way that IP addresses are assigned to multiple users or accounts and they are "not technologically capable of retaining the type of data that law enforcement needs because that's not how their system works."
  • ...1 more annotation...
  • This explanation is completely bogus. Wireless providers, like wireline broadband providers, are quite capable of retaining logs of the IP addresses they temporarily issue to their customers. Many wireless providers, such as Sprint and Verizon, already retain IP logs for at least a year. The true explanation for the loophole is, I believe, that the wireless carriers have powerful and remarkably effective lobbyists.
  •  
    In this opinion piece, a cybersecurity researcher argues that loopholes in a new data retention bill push those wanting to use the 'Net anonymously into cafes, libraries, and fast food restaurants. The following op-ed does not necessarily represent the opinions of Ars Technica.
juliet huang

Google applying double standards? - 6 views

We all know that Google revealed the blogger who called model Liskula Cohen a skank, and everyone in the web community was up in arms because it seems that Google has breached its duty to protect i...

started by juliet huang on 09 Sep 09 no follow-up yet
joanne ye

TJC Stomp Scandal - 34 views

This is a very interesting topic. Thanks, Weiman! From the replies for this topic, I would say two general questions surfaced. Firstly, is STOMP liable for misinformation? Secondly, is it right for...

Weiye Loh

Panopticlick - 0 views

  •  
    Panopticlick Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick tests your browser to see how unique it is based on the information it will share with sites it visits. Click below and you will be given a uniqueness score, letting you see how easily identifiable you might be as you surf the web. Only anonymous data will be collected by this site.
Weiye Loh

Studying the politics of online science « through the looking glass - 0 views

  • Mendick, H. and Moreau, M. (2010). Monitoring the presence and representation of  women in SET occupations in UK based online media. Bradford: The UKRC.
  • Mendick and Moreau considered the representation of women on eight ‘SET’ (science, engineering and technology) websites: New Scientist, Bad Science, the Science Museum, the Natural History Museum, Neuroskeptic, Science: So What, Watt’s Up With That and RichardDawkins.net. They also monitored SET content across eight more general sites: the BBC, Channel 4, Sky, the Guardian, the Daily Mail, Wikipedia, YouTube and Twitter.
  • Their results suggest online science informational content is male dominated in that far more men than women are present. On some websites, they found no SET women. All of the 14 people in SET identified on the sampled pages of the RichardDawkins.net website were men, and so were all 29 of those mentioned on the sampled pages of the Channel 4 website (Mendick & Moreau, 2010: 11).
  • ...8 more annotations...
  • They found less hyperlinking of women’s than men’s names (Mendick & Moreau, 2010: 7). Personally, I’d have really liked some detail as to how they came up with this, and what constituted ‘hyperlinking of women’s names’ precisely. It’s potentially an interesting finding, but I can’t quite get a grip on what they are saying.
  • They also note that the women that did appear, they were often peripheral to the main story, or ‘subject to muting’ (i.e. seen but not heard). They also noted many instances where women were pictured but remain anonymous, as if there are used to illustrate a piece – for ‘ornamental’ purposes – and give the example of the wikipedia entry on scientists, which includes a picture a women as an example, but stress she is anonymous (Mendick & Moreau, 2010: 12).
  • Echoing findings of earlier research on science in the media (e.g. the Bimbo or Boffin paper), they noted that women, when represented, tended to be associated with ‘feminine’ attributes and activities, demonstrating empathy with children and animals, etc. They also noted a clustering in specific fields. For example, in the pages they’d sampled of the Guardian, they found seven mentions of women scientists compared with twenty-eight of men, and three of the these women were in a single article, about Jane Goodall (Mendick & Moreau, 2010: 12-13).
  • The women presented were often discussed in terms of appearance, personality, sexuality and personal circumstances, again echoing previous research. They also noted that women scientists, when present, tended to be younger than the men, and there was a striking lack of ethnic diversity (Mendick & Moreau, 2010: 14).
  • I’m going to be quite critical of this research. It’s not actively bad, it just seems to lack depth and precision. I suspect Mendick and Moreau were doing their best with low resources and an overly-broad brief. I also think that we are still feeling our way in terms of working out how to study online science media, and so can learn something from such a critique.
  • Problem number one: it’s a small study, and yet a ginormous topic. I’d much rather they had looked at less, but made more of it. At times I felt like I was reading a cursory glance at online science.
  • Problem number two: the methodological script seemed a bit stuck in the print era. I felt the study lacked a feel for the variety of routes people take through online science. It lacked a sense of online science’s communities and cliques, its cultures and sub-cultures, its history and its people. It lacked context. Most of all, it lacked a sense of what I think sits at the center of online communication: the link.
  • It tries to look at too much, too quickly. We’re told that of the blog entries sampled from Bad Science, three out of four of the women mentioned were associated with ‘bad science’, compared to 12 out of 27 of the men . They follow up this a note that Goldacre has appeared on television critiquing Greenfield,­ a clip of which is on his site (Mendick & Moreau, 2010: 17-18). OK, but ‘bad’ needs unpacking here, as does the gendered nature of the area Goldacre takes aim at. As for Susan Greenfield, she is a very complex character when it comes to the politics of science and gender (one I’d say it is dangerous to treat representations of simplistically). Moreover, this is a very small sample, without much feel for the broader media context the Bad Science blog works within, including not only other platforms for Ben Goldacre’s voice but comment threads, forums and a whole community of other ‘bad science bloggers’ (and their relationships with each other)
  •  
    okmark
Weiye Loh

Rationally Speaking: What do I think of Wikipedia? - 0 views

  • Scholarpedia. I know, this is probably the first time you've heard of it, and I must admit that I never use it myself, but it is an open access peer reviewed encyclopedia, curated by Dr. Eugene M. Izhikevich, associated with an outlet called the Brain Corporation, out in San Diego, CA. Don’t know anything more about it (even Wikipedia doesn’t have an article on that!).
  • I go to Wikipedia at least some of the times to use it as a starting point, a convenient trampoline to be used — together with Google (and, increasingly, Google Scholar) — to get an initial foothold into areas with which I am a bit less familiar. However, I don’t use that information for my writings (professional or for the general public) unless I actually check the sources and/or have independent confirmation of whatever it is that I found potentially interesting in the relevant Wikipedia article.This isn’t a matter of academic snobbism, it’s rather a question of sensibly covering your ass — which is the same advice I give to my undergraduate students (my graduate students better not be using Wiki for anything substantial at all, the peer reviewed Stanford Encyclopedia of Philosophy being a manyfold better source across the board).
Weiye Loh

'Gay Girl in Damascus': Fact or Fiction? Some Speculate if Syrian Blogger Exists - TIME... - 0 views

  • Similarly, though some sites interviewed a "close friend" of Abdullah's, NPR reports that the source, Sandra Bagaria, only communicated with Abdullah via Facebook.
  • Bagaria also told NPR that, "Amina posted some 200 pictures [to Facebook] of someone who wasn't her." The person in question, is in fact Jelena Lecic, of London. Lecic told the BBC that she is not friends with Abdullah and has never met her. Her photo, however, has been used on several media sites to picture Abdullah.
  • While nobody knows the real truth, the discussion itself illustrates the many complications that can arise from Internet anonymity.
  •  
    NewsFeed has covered the story of the 'Gay Girl in Damascus,' a blogger who has drawn significant attention for writing about her experiences living as a gay woman in Syria. But recent reports question Amina Abdullah's identity and the veracity of her posts. NPR's Andy Carvin questioned Amina's existence in a tweet that asked if anyone had met Abdullah in person. He wrote that he decided to investigate after receiving, "a tip from an LGBT Syrian source who didn't believe Amina existed."
Weiye Loh

There Is Such A Thing As A Free Coffee | The Utopianist - Think Bigger - 0 views

  • Overall, the ratio of people taking versus giving is 2-1. Stark has a truly grand vision: “It’s literally giving people hope. Ultimately the goal is for more people to do this kind of thing. I admit it seems a little frivolous to give away coffee to people with iPhones. But imagine if you had a CVS card and you could give someone $10 for their Alzheimer’s medication. The concept of frictionless social giving is very attractive. And this is just the beginning of that.” It’s easy enough to text a number to make a donation during times of disaster, and many do it, but the concern may still exist over “where” the money is going; systems with re-loadable cards are straightforward and in some way more transparent (after all, the users probably have their own, personal, cards), serving to spur people into donating even more. I say let’s expand this — I cannot wait to see it act elsewhere — some sort of school card, perhaps? Download the full-sized card here; before you go, check the balance on Twitter — updated every couple of minutes, Stark wrote the program himself. “Like” Jonathan’s Starbucks Card on Facebook to spread the word; and when you want to donate, simply log on to the Starbucks website and reload card number 6061006913522430.
  •  
    Programmer Jonathan Stark, vice president of Mobiquity, has begun a truly cool experiment: sharing his Starbucks card with the world. While researching ways one can pay-by-mobile, Stark took an interesting perspective on Starbucks' system. He realized there was (at the time) no app for Android users, so he simply took a picture of his card and posted it online. He loaded it with $30 and then encouraged others to use it - and reload it, if they see fit. Not surprisingly, people took him up on it. Since those $30, the card has seen over $9,000 worth of anonymous donations. Stark says that "every time the balance gets really high, it brings out the worst in people: Someone goes down to Starbucks and makes a huge purchase. I don't know if they are buying coffee beans or mugs, or transferring money to their own card or what. But as long as the balance stays low, say $20 to $30, it seems like it manages itself. I haven't put any money on it in a while. All the money going through the card right now is the kindness of strangers."
Valerie Oon

Ethics discussion based on new movie, "Surrogates" - 8 views

This movie upset me. I don't think the director developed the premise and plot to the potential it could have reached. Quite a shallow interpretation. But it does raise some intrigue. I'm a bit stu...

technology future empowerment destruction

Weiye Loh

Gleick apology over Heartland leak stirs ethics debate among climate scientists | Envir... - 0 views

  • For some campaigners, such as Naomi Klein, Gleick was an unalloyed hero, who should be sent some "Twitter love", she wrote on Tuesday."Heartland has been subverting well-understood science for years," wrote Scott Mandia, co-founder of the climate science rapid response team. "They also subvert the education of our schoolchildren by trying to 'teach the controversy' where none exists."Mandia went on: "Peter Gleick, a scientist who is also a journalist, just used the same tricks that any investigative reporter uses to uncover the truth. He is the hero and Heartland remains the villain. He will have many people lining up to support him."
  • Others acknowledged Gleick's wrongdoing, but said it should be viewed in the context of the work of Heartland and other entities devoted to spreading disinformation about science."What Peter Gleick did was unethical. He acknowledges that from a point of view of professional ethics there is no defending those actions," said Dale Jamieson, an expert on ethics who heads the environmental studies programme at New York University. "But relative to what has been going on on the climate denial side this is a fairly small breach of ethics."He also rejected the suggestion that Gleick's wrongdoing could hurt the cause of climate change, or undermine the credibility of scientists."Whatever moral high ground there is in science comes from doing science," he said. "The failing that Peter Gleick engaged in is not a scientific failing. It is just a personal failure."
Weiye Loh

Do avatars have digital rights? - 20 views

hi weiye, i agree with you that this brings in the topic of representation. maybe you should try taking media and representation by Dr. Ingrid to discuss more on this. Going back to your questio...

avatars

1 - 20 of 41 Next › Last »
Showing 20 items per page