How Anonymous Are Your Online Posts?

  /     /     /  
Publicated : 22/11/2024   Category : security


How Anonymous Are Your Online Posts?


Beware flamebait-throwers, grammar police, and all-around trolls: New algorithm can correctly identify an author 80% of the time, using sufficient source documents.



Anonymous: 10 Facts About The Hacktivist Group (click image for larger view and for slideshow)
By applying linguistic stylometry, a team of researchers from Stanford University and the University of California, Berkeley, has built an algorithm that can often match existing bodies of writing--for which the author is known--with anonymous postings. They plan to present the results of their research at the
IEEE Symposium on Security and Privacy
in May.
Stylometric identification exploits the fact that we all have a fingerprint based on our stylistic choices and idiosyncrasies with the written word, said report co-author Arvind Narayana, a post-doctoral computer science researcher at Stanford, in a
blog post
. Interestingly, Narayanas previous work has included studying how to break the
anonymity of Netflix Prize data
, as well as highlighting the
difficulty of remaining anonymous
on social networks.
In this case, by using linguistic stylometry, the researchers were able to correctly identify authors 20% of the time when analyzing a corpus of texts from 100,000 authors for which they had an average of 20 posts per person. But it gets better from there, said Narayana. In 35% of cases, the correct author is one of the top 20 guesses. Why does this matter? Because in practice, algorithmic analysis probably wont be the only step in authorship recognition, and will instead be used to produce a shortlist for further investigation.
[ Hacktivists have taken down a number of government websites, including the CIAs. Read more at
CIA Website Hacked, Struggles To Recover
. ]
For example, he said, an authors location could add further context. Likewise, if a law enforcement agency required a service provider to disclose a subscribers log-in and log-out times, they could compare those with the times that posts were made. Notably, that technique appears to have been used to
help identify and bust an alleged LulzSec suspect
.
The researchers also found that when they have more written words to draw from, their ability to correctly identify an author of an anonymous text improves noticeably. For example, when working with 40 to 50 attributed posts rather than just 20, researchers pushed their accuracy rate up to 35%. In addition, the researchers found that they could program their algorithm to return results only when it was confident that a match had been found. In such cases, the algorithm does not always attempt to identify an author, but when it does, it finds the right author 80% of the time, Narayana said.
In other words, the days of practical online anonymity may be numbered, despite the right to anonymous free speech--online or otherwise--having been enshrined in U.S. law. As the Supreme Court wrote in a 1995 decision referenced by the researchers, Anonymity is a shield from the tyranny of the majority ... It thus exemplies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation ... at the hand of an intolerant society.
But there have been exceptions. To date, some legal requests to
force service providers to reveal peoples actual identities
--typically, to put a subscriber name to an IP address--have been successful. But in general, such identification has first required demonstrating that criminal activity, such as defamation, occurred.
Unfortunately, advances in stylometric identification pose concerns for bloggers or whistleblowers who post anonymously to escape retribution, as well as for the sanctity of online anonymity and free speech in general. Indeed, if technology could be used to identify the authors of anonymous posts, then legal attempts to force service providers to unmask subscribers wouldnt be required.
Thankfully, the Stanford and Berkeley researchers said that online anonymity isnt set to disappear just yet. Notably, their approach isnt reliable unless theres a decent amount of text to analyze. Thats true even when analyzing a piece of anonymous text for which there could only be two authors.
Another limitation is that the researchers havent yet analyzed whether people write differently depending on the medium. To date, theyve only compared emails with emails, and blogs with blogs. Peoples writing style, however, may differ when writing a blog as opposed to an email. As a result, it might be difficult to attribute anonymous emails to an author for whom researchers had only blog posts.
But perhaps the biggest limitation is that the attack is unlikely to work if the victim intentionally obfuscates their writing style, they said. In other words, anyone who wants to remain anonymous can proactively vary their writing style, swapping word order or hitting the thesaurus to select synonyms they might not otherwise use.
Interestingly, this isnt the first time that computer scientists have attempted to use statistical textual analysis to identity authors. Numerous scholars have subjected Shakespeare’s plays--or as some might say, the plays attributed to Shakespeare--to a
rigorous statistical analysis
, seeking clues as to whether the works may instead have been authored or co-authored by one of The Bards contemporaries.
Those studies are limited by researchers needing to have enough source material--plays, poems, and letters, for example--from other potential authors to produce statistically significant results. But in the online realm, users of blogs, Twitter, Facebook, and other social networks continue to generate an ever-greater quantity of publicly accessible words written with their own particular linguistic fingerprints.
The right forensic tools in the right hands are just a start. The new
Digital Detectives
issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

Last News

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
How Anonymous Are Your Online Posts?