{"id":1196,"date":"2011-07-22T16:44:39","date_gmt":"2011-07-23T00:44:39","guid":{"rendered":"\/?p=1196"},"modified":"2011-07-22T16:48:09","modified_gmt":"2011-07-23T00:48:09","slug":"who-is-harmed-by-a-real-names-policy","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1196","title":{"rendered":"Who is harmed by a &#8220;Real Names&#8221; policy?"},"content":{"rendered":"<p>Skud at <a href=\"http:\/\/geekfeminism.org\/2011\/07\/19\/who-is-harmed-by-a-real-names-policy\/\">Geek Feminism Blog<\/a> has created a wiki documenting work she and her colleagues are doing to &#8220;draft a comprehensive list&#8221; of those who would be harmed by a policy banning pseudonymity and requiring \u201creal names\u201d.<\/p>\n<p>The result is impressive.\u00a0 The rigour Skud and colleagues have applied to their quest has produced an information payload that is both illuminating and touching.<\/p>\n<p>Those of us working on identity technology have to internalize the lessons here.\u00a0 Over-identification is ALWAYS wrong.\u00a0 But beyond that, there are people who are especially vulnerable to it.\u00a0 They have to be treated as first class citizens with clear rights and we need to figure out how to protect them.\u00a0 This goes beyond what we conventionally think of as privacy concerns (although perhaps it sheds light on the true nature of what privacy is &#8211; I&#39;m still learning).<\/p>\n<p>Often people argue in favor of &#8220;Real Names&#8221; in order to achieve accountability.\u00a0 The fact is that technology offers us other ways to achieve accountability.\u00a0 By leveraging the properties of minimal disclosure technology, we can allow people to remain anonymous and yet bar them from given environments if their behavior gets sufficiently anti-social.<\/p>\n<p>But enough editorializing.\u00a0 Here&#39;s Skud&#39;s intro.\u00a0 Just remember that in this case the real enlightenment is <a href=\"http:\/\/geekfeminism.wikia.com\/wiki\/Who_is_harmed_by_a_%22Real_Names%22_policy%3F\" class=\"broken_link\">in the details<\/a>, not the summary.<\/p>\n<blockquote><p>This page lists groups of people who are disadvantaged by any policy which bans <a title=\"Pseudonymity\" href=\"\/wiki\/Pseudonymity\" class=\"broken_link\">Pseudonymity<\/a> and requires so-called &#8220;Real names&#8221; (more properly, legal names).<\/p>\n<p>This is an attempt to create a comprehensive list of groups of people who are affected by such policies.<\/p>\n<p>The cost to these people can be vast, including:<\/p>\n<ul>\n<li> harassment, both online and offline<\/li>\n<li> discrimination in employment, provision of services, etc.<\/li>\n<li> actual physical danger of bullying, hate crime, etc.<\/li>\n<li> arrest, imprisonment, or execution in some jurisdictions<\/li>\n<li> economic harm such as job loss, loss of professional reputation, etc.<\/li>\n<li> social costs of not being able to interact with friends and colleagues<\/li>\n<li> possible (temporary) loss of access to their data if their account is suspended or terminated<\/li>\n<\/ul>\n<p>The groups of people who use pseudonyms, or want to use pseudonyms, are not a small minority (some of the classes of people who can benefit from pseudonyms constitute up to 50% of the total population, and many of the others are classes of people that almost everyone knows). However, their needs are often ignored by the relatively <a title=\"Privilege\" href=\"\/wiki\/Privilege\" class=\"broken_link\">privileged<\/a> designers and policy-makers who want people to use their real\/legal names.<\/p><\/blockquote>\n<p>Wait a minute.\u00a0 Just got a note from the I Can&#39;t Stop Editorializing Department: the very wiki page that brings us Skud&#39;s analysis contains a Facebook &#8220;Like&#8221; button.\u00a0 It might be worth removing it given that Facebook requires &#8220;Real Names&#8221;, and then transmits the URL of any page with a &#8220;Like&#8221; button to Facebook so it can be associated with the user&#39;s &#8220;Real Name&#8221; &#8211; <a href=\"\/?p=1161\">whether or not they click on the button or are logged into Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Those of us working on identity technology have to internalize the lessons here<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49,63,17,71,40,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1196"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1196"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1196\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}