Anonymous may refer to:
4chan is an English-language imageboard website. Users generally post anonymously, with the most recent posts appearing above the rest. 4chan is split into various boards with their own specific content and guidelines. Registration is not possible (except for staff).
Launched on October 1, 2003, the site was modeled on Japanese imageboards, particularly Futaba Channel. 4chan's first boards were originally primarily used for posting pictures and discussing manga and anime. The site quickly became popular, expanded, and now features boards dedicated to a wide variety of topics, from anime/manga to video games, music, literature, fitness, politics, and sports.
The site has been linked to Internet subcultures and activism groups, most notably Anonymous, the alt-right and Project Chanology. 4chan users have been responsible for the formation or popularization of Internet memes such as lolcats, Rickrolling, "Chocolate Rain", Pedobear, and many others. The site's "Random" board, also known as "/b/", was the first board to be created, and is the one that receives the most traffic. The Random board has minimal rules on posted content. Gawker once jokingly claimed that "reading /b/ will melt your brain". The site's anonymous community and culture have often provoked media attention.
4chan users have been instrumental in pranks such as hijacking Internet destinations to cause images of Rick Astley to appear in place of their content, coordinating attacks against other websites and Internet users, exposing animal abuse, and posting threats of violence in order to elicit individual and public reactions. The Guardian once summarized the 4chan community as "lunatic, juvenile ... brilliant, ridiculous and alarming".Alcoholics Anonymous
Alcoholics Anonymous (AA) is an international fellowship of men and women who have had a drinking problem. Their stated purpose is to enable “members to stay sober and help other alcoholics achieve sobriety." It is nonprofessional, self-supporting, and apolitical. The only requirement for membership is a desire to stop drinking. The AA program is set forth in the Twelve Steps and discussed at AA group meetings.It was founded in Akron, Ohio when in 1935 one alcoholic, Bill Wilson, talked to another alcoholic, Bob Smith, about the nature of alcoholism and a possible solution. With the help of other early members, the book Alcoholics Anonymous: The Story of How More Than One Hundred Men Have Recovered From Alcoholism was written in 1939. Its title became the name of the organization and is now usually referred to as "The Big Book". AA's initial Twelve Traditions were introduced in 1946 to help the fellowship be stable and unified while disengaged from "outside issues" and influences.The Traditions recommend that members remain anonymous in public media, altruistically help other alcoholics, and that AA groups avoid official affiliations with other organizations. They also advise against dogma and coercive hierarchies. Subsequent fellowships such as Narcotics Anonymous have adapted the Twelve Steps and the Twelve Traditions to their respective primary purposes.AA membership has since spread internationally "across diverse cultures holding different beliefs and values", including geopolitical areas resistant to grassroots movements. Close to two million people worldwide are estimated to be members of AA as of 2016.Anonymity
Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, "anonymous" is used to describe situations where the acting person's name is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty.
An important example for anonymity being not only protected, but enforced by law is the vote in free elections. In many other situations (like conversation between strangers, buying some product or service in a shop), anonymity is traditionally accepted as natural. There are also various situations in which a person might choose to withhold their identity. Acts of charity have been performed anonymously when benefactors do not wish to be acknowledged. A person who feels threatened might attempt to mitigate that threat through anonymity. A witness to a crime might seek to avoid retribution, for example, by anonymously calling a crime tipline. Criminals might proceed anonymously to conceal their participation in a crime. Anonymity may also be created unintentionally, through the loss of identifying information due to the passage of time or a destructive event.
In a certain situations, however, it may be illegal to remain anonymous. In the United States, 24 states have "stop and identify" statutes that require persons detained to self-identify when requested by a law enforcement officer.
The term "anonymous message" typically refers to a message that does not reveal its sender. In many countries, anonymous letters are protected by law and must be delivered as regular letters.
In mathematics, in reference to an arbitrary element (e.g., a human, an object, a computer), within a well-defined set (called the "anonymity set"), "anonymity" of that element refers to the property of that element of not being identifiable within this set. If it is not identifiable, then the element is said to be "anonymous."Anonymous (group)
Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.
Anonymous originated in 2003 on the imageboard 4chan representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain. Anonymous members (known as Anons) can be distinguished in public by the wearing of Guy Fawkes masks in the style portrayed in the graphic novel and film V for Vendetta. However, this may not always be the case as some of the collective prefer to instead cover their face without using the well-known mask as a disguise. Some anons also opt to mask their voices through voice changers or text-to-speech programs.
In its early form, the concept was adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal and primarily focused on entertainment (or lulz). Beginning with Project Chanology in 2008—a series of protests, pranks, and hacks targeting the Church of Scientology—the Anonymous collective became increasingly associated with collaborative hacktivism on a number of issues internationally. Individuals claiming to align themselves with Anonymous undertook protests and other actions (including direct action) in retaliation against copyright-focused campaigns by motion picture and recording industry trade associations. Later targets of Anonymous hacktivism included government agencies of the U.S., Israel, Tunisia, Uganda, and others; the Islamic State of Iraq and the Levant; child pornography sites; copyright protection agencies; the Westboro Baptist Church; and corporations such as PayPal, MasterCard, Visa, and Sony. Anons have publicly supported WikiLeaks and the Occupy movement. Related groups LulzSec and Operation AntiSec carried out cyberattacks on U.S. government agencies, media, video game companies, military contractors, military personnel, and police officers, resulting in the attention of law enforcement to the groups' activities.
Dozens of people have been arrested for involvement in Anonymous cyberattacks in countries including the U.S., U.K., Australia, the Netherlands, Spain, India, and Turkey. Evaluations of the group's actions and effectiveness vary widely. Supporters have called the group "freedom fighters" and digital Robin Hoods while critics have described them as "a cyber lynch-mob" or "cyber terrorists". In 2012, Time called Anonymous one of the "100 most influential people" in the world.Anonymous Content
Anonymous Content is an entertainment company founded in 1999 by CEO Steve Golin. It is based in Los Angeles with its offices in Culver City and New York City.Anonymous for the Voiceless
Anonymous for the Voiceless (AV) are a grassroots animal rights organization specializing in street activism formed in April 2016 in Melbourne, Australia. They hold Cube of Truth actions throughout hundreds of locations across the world, spreading awareness for veganism. It is not directly affiliated to the hacktivist group "Anonymous", despite the use of similar masks.Doxing
Doxing (from dox, abbreviation of documents) or doxxing is the Internet-based practice of researching and broadcasting private or identifying information (especially personally identifying information) about an individual or organization.The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to Internet vigilantism and hacktivism.
Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, risk analytics, extortion, coercion, inflicting harm, harassment, online shaming, and vigilante justice.File Transfer Protocol
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.
FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.Hornswoggle
Dylan Mark Postl (born May 29, 1986) is an American professional wrestler and actor who is known for his time in WWE under the ring name Hornswoggle. He is also known for his work in Impact Wrestling under the ring name Swoggle. He debuted in WWE in 2006, allied with Finlay. Hornswoggle won the Cruiserweight Championship in its first stint, was erroneously revealed as Vince McMahon's storyline illegitimate son, and was exposed as the Anonymous Raw General Manager who had controlled the Raw brand from June 21, 2010 to July 18, 2011.Project Chanology
Project Chanology (also called Operation Chanology) was a protest movement against the practices of the Church of Scientology by members of Anonymous, a leaderless Internet-based group. The project was started in response to the Church of Scientology's attempts to remove material from a highly-publicized interview with Scientologist Tom Cruise from the Internet in January 2008.
The project was publicly launched in the form of a video posted to YouTube, "Message to Scientology", on January 21, 2008. The video states that Anonymous views Scientology's actions as Internet censorship, and asserts the group's intent to "expel the church from the Internet". This was followed by distributed denial-of-service attacks (DDoS), and soon after, black faxes, prank calls, and other measures intended to disrupt the Church of Scientology's operations. In February 2008, the focus of the protest shifted to legal methods, including nonviolent protests and an attempt to get the Internal Revenue Service to investigate the Church of Scientology's tax exempt status in the United States.
Reactions from the Church of Scientology regarding the protesters' actions have varied. Initially, one spokesperson stated that members of the group "have got some wrong information" about Scientology. Another referred to the group as a group of "computer geeks". Later, the Church of Scientology started referring to Anonymous as "cyberterrorists" perpetrating "religious hate crimes" against the church.
Detractors of Scientology have also criticized the actions of Project Chanology, asserting that they merely provide the Church of Scientology with the opportunity to "play the religious persecution card". Other critics such as Mark Bunker and Tory Christman initially questioned the legality of Project Chanology's methods, but have since spoken out in support of the project as it shifted towards nonviolent protests and other legal methods.Proxy server
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems.S.A. (corporation)
S.A. or Société anonyme (English: Anonymous society) (and variants) designates a type of corporation in countries that mostly employ civil law. Depending on language, it means anonymous company, anonymous partnership, share company, or joint-stock company, roughly equivalent to public limited company in common law jurisdictions. It is different from partnerships and private limited companies.
Originally, shareholders could be literally anonymous and collect dividends by surrendering coupons attached to their share certificates. Dividends were therefore paid to whoever held the certificate. Share certificates could be transferred privately, and therefore the management of the company would not necessarily know who owned its shares.
Like bearer bonds, anonymous, illegal unregistered share ownership and dividend collection enabled money laundering, tax evasion, and concealed business transactions in general, so governments passed laws to audit the practice. Nowadays, shareholders of S.A.s are not anonymous, though shares can still be held by holding companies in order to obscure the beneficiary.Silk Road (marketplace)
Silk Road was an online black market and the first modern darknet market, best known as a platform for selling illegal drugs. As part of the dark web, it was operated as a Tor hidden service, such that online users were able to browse it anonymously and securely without potential traffic monitoring. The website was launched in February 2011; development had begun six months prior. Initially there were a limited number of new seller accounts available; new sellers had to purchase an account in an auction. Later, a fixed fee was charged for each new seller account.In October 2013, the Federal Bureau of Investigation (FBI) shut down the website and arrested Ross Ulbricht under charges of being the site's pseudonymous founder "Dread Pirate Roberts". On 6 November 2013, Silk Road 2.0 came online, run by former administrators of Silk Road. It too was shut down, and the alleged operator was arrested on 6 November 2014 as part of the so-called "Operation Onymous". Ulbricht was convicted of eight charges related to Silk Road in the U.S. Federal Court in Manhattan and was sentenced to life in prison without possibility of parole.Source (journalism)
In journalism, a source is a person, publication, or other record or document that gives timely information. Outside journalism, sources are sometimes known as "news sources". Examples of sources include official records, publications or broadcasts, officials in government or business, organizations or corporations, witnesses of crime, accidents or other events, and people involved with or affected by a news event or issue.
According to Shoemaker (1996) and McQuail (1994), there are a multitude of factors that tend to condition the acceptance of sources as bona fide by investigative journalists. Reporters are expected to develop and cultivate sources, especially if they regularly cover a specific topic, known as a "beat". Beat reporters must, however, be cautious of becoming too close to their sources. Reporters often, but not always, give greater leeway to sources with little experience. For example, sometimes a person will say they don't want to talk, and then proceed to talk; if that person is not a public figure, reporters are less likely to use that information. Journalists are also encouraged to be skeptical without being cynical, as per the saying "If your mother says she loves you, check it out." this was popularized by the City News Bureau of Chicago. As a rule of thumb, but especially when reporting on controversy, reporters are expected to use multiple sources.Timeline of events associated with Anonymous
Anonymous is a decentralized virtual community. They are commonly referred to as an internet based collective of hacktivists whose goals, like its organization, are decentralized. Anonymous seeks mass awareness and revolution against what the organization perceives as corrupt entities, while attempting to maintain anonymity. Anonymous has had a hacktivist impact. This is a timeline of activities reported to be carried out by the group.Tor (anonymity network)
Tor is free and open-source software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.
Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy, but does not hide the fact that someone is using Tor. Some websites restrict allowances through Tor. For example, the MediaWiki TorBlock extension automatically restricts edits made through Tor, although Wikipedia allows some limited editing in exceptional circumstances.Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, random-selection Tor relays. Each relay decrypts a layer of encryption to reveal the next relay in the circuit to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing or knowing the source IP address. Because the routing of the communication was partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.An adversary may try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user's computer. The NSA had a technique that targets a vulnerability – which they codenamed "EgotisticalGiraffe" – in an outdated Firefox browser version at one time bundled with the Tor package and, in general, targets Tor users for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research which is welcomed by the Tor Project itself. The bulk of the funding for Tor's development has come from the federal government of the United States, initially through the Office of Naval Research and DARPA.Twelve-step program
A twelve-step program is a set of guiding principles outlining a course of action for recovery from addiction, compulsion, or other behavioral problems. Originally proposed by Alcoholics Anonymous (AA) as a method of recovery from alcoholism, the Twelve Steps were first published in the 1939 book Alcoholics Anonymous: The Story of How More Than One Hundred Men Have Recovered from Alcoholism. The method was adapted and became the foundation of other twelve-step programs.
As summarized by the American Psychological Association, the process involves the following:
admitting that one cannot control one's alcoholism, addiction or compulsion;
recognizing a higher power that can give strength;
examining past errors with the help of a sponsor (experienced member);
making amends for these errors;
learning to live a new life with a new code of behavior;
helping others who suffer from the same alcoholism, addictions or compulsions.Weasel word
A weasel word, or anonymous authority, is an informal term for words and phrases such as "researchers believe" and "most people think" which make arguments appear specific or meaningful, even though these terms are at best ambiguous and vague. Using weasel words may allow someone to later deny any specific meaning if the statement is challenged, because the statement was never specific in the first place. Weasel words can be a form of tergiversation, and may be used in advertising and political statements to mislead.
Weasel words can soften or under-state a biased or otherwise controversial statement. An example of this is using terms like "somewhat" or "in most respects", which make a sentence more ambiguous than it would be without them.Web hosting service
A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for other servers located in their data center, called colocation, also known as Housing in Latin America or France.