I’m just some middle aged white guy, why is name privacy so important to me?

No Hate. Copyright © 2011 by Shadi Fotouhi
No Hate. Copyright © 2011 by Shadi Fotouhi

I’m just another middle-aged, reasonably well-off, American white guy.

So why do I believe so strongly in the importance of letting people control who sees their real name, when you don’t?

I was thinking about that this morning, because I know that if you’d asked me this question three years ago, I would have been strongly pro-privacy, but I would not have been as passionate about it as I am now. What’s changed?

The difference is that in the past three years, I’ve spent a lot of time socializing with people who are private about their birth names. I’ve met them on Twitter, and I’ve met them in person. I’ve even driven across the country to meet up with friends whose birth name I didn’t know until I was camped out on their couch. As a result, I’ve heard things that you just don’t hear when people have to use their birth names in public.

When you create a social networking site that requires real names, you create an artificial bubble. What you see is just the nice things in people’s lives, you don’t see what’s really happening. But when people have control over who knows their name, they still talk about cute cats and the latest iPhone and what kind of wine they drank last night, but they also talk about other things. They talk about dealing with their parent’s Alzheimer’s. They talk about how their daughter was missing for three days and got drugged and raped and the police refused to follow up. They talk about how they just lost their job and they’re worried that they’ll end up on the street. They talk about how their boss will fire them if he finds out they’re gay. They talk about how they were sexually abused as a kid. They talk about what it’s like to live in a country where bloggers get thrown in prison. People don’t dare talk about those things with their birth names; not when Google is indexing everything they say.

When you avoid or ban people who protect their birth names, you create an artificial world, one that doesn’t reflect what’s going on in the real world. When you surround yourself only with people who are using their birth names, you get the impression that everything is fine out there. That this is America, and people don’t discriminate, people aren’t ending up on the street through no fault of their own, people aren’t getting stalked to their doorsteps because someone learned their name, and people aren’t being judged by their sexual orientation. You’re surrounded by people who seem to be just like you, because the conversation has been reduced to what’s acceptable at the work watercooler.

The sad thing is, if you’re dealing with something difficult in your life, that bubble also makes you think you’re alone. You think you’re the only one, because nobody else is talking about how they’re going to pay for their parents nursing care, or how hard it is to juggle work and family.

Of course, maybe you don’t want to hear about other people’s problems on Google+. There’s nothing wrong with that. I don’t particularly want to hear what kind of wine Robert Scoble had last night, so I don’t circle him. If you don’t want to hear about how Jane S is dealing with her son smoking pot, then you don’t have to circle her. But that doesn’t mean that Jane S shouldn’t have a right to join Google+ and comment on your post about the latest merger, or give her opinion on the riots in London, or talk to friends who do want to talk about raising kids. Just because she protects her privacy more than you, doesn’t mean her opinion isn’t valuable. Furthermore, having people with different backgrounds in a discussion makes for a far more educational and interesting conversation.

Google’s name policy is intended to create the illusion that we are all at a fancy restaurant; they’ve explicitly used that metaphor. Unfortunately, in doing so they have denied access to a lot of interesting people; to teachers, lawyers, doctors, activists and government employees; people who aren’t allowed to use their real name to express their real opinions. And they’ve driven away a lot of people with a very legitimate need for privacy; the abused, the victims, the stalked, the discriminated against. That wasn’t Google’s intent, but they believe that losing ten or more percent of the population is a legitimate cost in their goal to create the illusion of normalcy.

I think people who say “I’m more comfortable talking to people who use their real names” or “they should find another social network” don’t realize just what a broad swath of the population is being eliminated by this policy. They don’t realize, because they’ve never had an honest and open conversation with anyone affected by it. They don’t know that their co-worker is gay, or that their favorite barista got raped last month, or that their son’s teacher is an atheist. They don’t know that the person they are banning may be a neighbor or even a friend. They also don’t realize how important online social networks are to people who don’t have the freedom to talk to their peers in any other environment. Social networks aren’t a “game”, they aren’t something you do outside of your “real” life. Social networks are a real place where real people meet, make friends, share ideas, create business relationships, and even end up getting married. And all of those things happen even if they initially meet without sharing their birth names. “Jane S” is just as real a person as “Jane Smith”, and perhaps even more so.

Google certainly has a right to create a fancy restaurant with an illusion that everyone is telling the truth about who they are. But it’s just that, an illusion. Many of us looked at Google as the one internet company that understood the importance of privacy. They stood up to China and left the market when forced to censor. They’ve fought the hackers who have attempted to keep Google from providing secure email to dissidents around the world. We thought that if Google was going to create a social network, they would create one that mirrored the real world. One where people had control over who saw their birth names and who didn’t. A social network that upheld the basic freedoms we expect in a democratic society. Instead, they just created a more authoritarian version of Facebook.

It doesn’t have to be this way. You can hit that “Send Feedback” button and tell Google that you don’t want them to discriminate. You can tell them that you’re happy to hear the opinions of people who don’t have the freedom and security to use their birth names. You can tell Google that you want to hear from people who come from different backgrounds than you. You can tell Google that you don’t really mind if that guy with the fabulous photos is called “John” or “JujuBoy”. You can tell Google that you want a social network where people are free to talk about all of their lives, not just the parts they don’t want in the paper tomorrow or in twenty years. Or you can decide that what you really want is a an artificial bubble where everyone talks about technology and cat pictures.

Personally, I prefer reality.


For more details on who is hurt by Google’s policy, read “Who is harmed by a real names policy”(http://j.mp/pojGSo) or my long post here: http://j.mp/pJC2PO (skip to “Who Needs a Pseudonym?”). If you have any other thoughts on why it’s bad to let people control who sees their birth name, please read that post first, I probably discuss them.

For my thoughts on privilege, a word I always used to find personally insulting, read my post here: http://j.mp/o2ApQ3. What I refer to as “being in a bubble” has a lot to do with the concept.

For some excellent personal statements on the importance of name privacy, see http://my.nameis.me/

If you’re wondering where I came up with “ten or more percent of the population”, that’s what I believe is a conservative estimate, based on the number of people on Facebook who don’t use their real names. Those people are disproportionately minorities and women. Read researcher Danah Boyd’s article ““Real Names” Policies Are an Abuse of Power” at http://j.mp/ojrQ3g. I can’t find the original reference to the percentage (can anyone give me a link?), but it was confirmed by my own check of a few Facebook groups I belong to.

Drawing by my daughter, Shadi Fotouhi. (Still too young to join Google+ :). [Well, that was in 2011. As of 2017 she’s graduated from art school and is doing QA for a robotics company.]

Original post on Google+ here: http://j.mp/qlY5jv

On Pseudonymity, Privacy and Responsibility on Google+

[This was originally posted on Google+ (https://plus.google.com/117903011098040166012/posts/asuDWWmaFcq) where it went viral for a while. It’s still my most popular post. Since then of course Google finally gave up on their “real names” policy. Turns out it didn’t actually improve the quality of discussion at all–and it hurt people. Facebook, OTOH, still deletes accounts using pseudonyms, and it continues to be a tool of attackers to shut down victims.]


Google has said that they plan to “address” the issue of pseudonymity in the near future. I hope that these thoughts and experiences may help inform that decision.

Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society.
———— 1995 Supreme Court ruling in McIntyre v. Ohio Elections Commission

This whole persona/pseudonym argument may seem like a tempest in a teapot, but the fact is, the forum for public discourse is no longer the town hall, or newspaper, or fliers on the street. It is here on the Internet, and it is happening in communities like this, hosted by private sector companies. Freedom of speech is not guaranteed in these places. As +Lawrence Lessig once said,“the code is the law.” The code that Google applies, the rules they set up now in the software, are going to influence our right to speak out now and in the future. It is imperative that we impress upon Google the importance of providing users with the same rights (and responsibilities) as exist in the society that nurtured Google and brought about its success.

I’m going to try to summarize the discussion as I’ve seen it over the past few weeks. Since this is a long post (tl;dr), here’s a description of what’s coming so if you want, you can skip to the section that you’re interested in.

First I’m going to address some red herrings; arguments that actually have no bearing on pseudonyms. I will explain why I think we should be having this discussion about a company’s product. I’ll explain, through painful personal disclosure, the experience of close friends, and other examples, why someone might want to use a pseudonym. Then I will address the arguments I have heard against pseudonyms (and some of them are quite valid), and what some alternatives might be.

I apologize for the length of this post, I know it could be trimmed.

Politics at Funerals

Here CNN discusses President Carter’s introduction of politics into his funeral speech for Corretta Scott King. Apparently this has been raising a fuss among some conservatives. As CNN says: “After the funeral yesterday, Kate O’Beirne, a prominent conservative writer, said liberals don’t know how to keep politics out of their funerals.”

Personally I find the fuss strange. Funerals are frequently a rallying point for the ideals of the deceased. When else do you have the attention of the country focused and thinking about a single set of values and issues? Nobody is claiming that President Carter said anything that would have gone contrary to the wishes of Correta King. On the contrary, she probably would have been very pleased at the attention those words have received.

Here is the portion President Carter’s speech which raised the fuss: “It was difficult for them personally with the civil liberties of both husband and wife violated as they became the targets of secret government wiretapping, other surveillance.” The video is here. Anyone who thinks that wiretaps without court supervision will always be used correctly, for the right purposes, and not to discredit legitimate causes, should think long and hard about our history.

Why I do *not* support Family PC’s Parent’s Bill of Rights

When was it that everyone started to talk about
rights, and forgot all about responsibilities?

[A note from the future, in 2017. I was right. I didn’t get more conservative, and they grew up safe and awesome. One’s editing movies. The other’s working QA at a robotics company. Let’s hear it for sensible parenting.]

Kee's kids--A long time ago
Before I begin, let me set
some context. I’m a parent, I have two terminally cute daughters; one six, the
other four. I’ve heard that the number one correlation between sexual conservatism
and other factors is whether a person has daughters. Maybe things will be different
when they reach adolescence, but so far my values haven’t changed.

So now we have had a
summit,
and
everyone’s talking about how to protect the rights of
parents on the internet.
This is apparently something that greatly concerns many parents,
although
from a reading of the statistics,
I can only assume that it’s primarily a concern of parents who are
not
on the internet, since those that are, aren’t even using the available
tools. But I don’t mean to belittle the core desire–parents
want to make sure that children’s exposure to new concepts and people is
consistent with their beliefs, whether that exposure is on the internet, the
street, or the corner store.

And that’s the fundamental issue I have with all this ruckus. The
internet doesn’t exist as a thing, it isn’t something that’s safe or not
safe. The internet is a community of people, and the things you
have to teach your kids in this community are the same as the things you teach
them in your own. Be polite, don’t interrupt, don’t speak unless
you have something to say, stay away from the seamier parts of town, and of
course, don’t go off alone with strangers. Those are values I try and teach my
kids. If I haven’t gotten them across by the time they learn to
send email, it’s probably too late anyway. But these values are not
specific to
the internet–I expect them to be applied online, and down at the
coffee shop.

I think I know where things went wrong. Some parents thought that if
their kid was staying home in front of the computer, that they were safe
and could be left alone–just like when they were sitting in front
of the television. They were wrong of course, the two mediums are not
comparible–there is far more violence and sex on television.

But on the internet, no one knows you’re a dog. What good does it do to teach
your kids right from wrong, if someone can pretend to be a teenage soulmate,
when they are actually a lecherous old man? There is some validity in this,
but frankly, anyone who has spent much time in online communities very quickly
learns that identity is both central to, and yet completely apart from, the
online experience. I spent my freshman year in college hooked on “the con”,
as it was called by those of us with access to
Dartmouth’s
Time Sharing System
years before AOL’s forums and IRC. We all knew
the story of the guy that gets all excited about this great girl he’s been chatting
with for hours, only to walk over to his roommate’s cubby to tell him the news–and
find out he’s been chatting with him all this time. The notion of an
online identity, or identities, that is separate from your physical one is fundamental
to the system–our children will understand that long before their parents.
This isn’t the dark side of the internet, this is one of the liberating things
about the internet. (Note that having multiple identities is not the same as
being anonymous, I’ll talk more about that some other time–if you want some
mandatory reading on that subject, check out “The Transparent Society : Will Technology Force Us to Choose Between
Privacy and Freedom”
by David Brin.)

“But…,” (says my wife), “it is different, you think they
are safe because they are in the house. With other communities, you know where
they are.” Well, one can hope, but the teen
pregnancy
rate in the U.S. would seem to argue otherwise. The fact of the
matter is that, the older your kids get, the less control you have over them.
That’s why I see this whole thing very differently. This isn’t an issue of parent’s
rights, it’s a question of parent’s responsibilities, and that’s
a word that seems to be very much out of favor recently. All the internet is
doing is bringing home that our job as parents is not to control, but to guide.

Here is FamilyPC’s “Internet Bill of Rights” proposal, with my responses. They asked if they
could publish by responses, so if you see it in a physical copy, let me
know which issue.

  1. Parental blocking software should be integrated into every Internet
    browser.


    Including experimental
    ones? Ones meant for developer use only? Ones running on PDAs that
    don’t
    have the necessary memory or CPU? No. If the demand is there, the
    industry
    will provide it. Protection of children is the responsibility of
    the parent,
    not something that can be regulated.
  2. Web site creators must
    rate their
    sites in an industry-standard way that is recognizable by the browser
    (for now this means using RSACi or SafeSurf or PICS).


    Aside from being
    unenforcable, there is no need to do this. If people stop going to
    unrated
    sites, then sites will rate themselves. The fact of the matter is the
    majority of sites that rate themselves are adult sites–they don’t
    want
    minors on their sites. The rest of sites don’t have the time or
    interest
    to rate themselves.
  3. An arbitration board should be created to
    arbitrate
    discrepancies in site ratings.


    That implies that ratings have the
    force
    of law. Ratings are going to be relative my definition. An independent
    board cannot be created to legislate free speech. If we were
    talking about
    signs on a front yard, this wouldn’t stand up in court for a
    second.

  4. Webmasters who do not comply with voluntary ratings should not be
    listed
    on the major search services.


    Absolutely not. This restricts adult
    access
    to sites, never mind access to sites outside of the United States.
    Search
    engines are already beginning to offer alternative, rated-only search
    facilities. There is no need to legislate this.
  5. Children’s chat
    rooms
    will be monitored to keep them safe; monitoring can be human or
    electronic.


    If you are worried about what your children say to whom, then
    monitor
    them. Don’t forget to tape phone conversations and follow them to the
    school bathroom as well. Chat room monitoring is neither practical or
    workable.
  6. Web sites must fully disclose what they do with
    information
    collected from people who register at their sites.


    This is a
    general issue
    that has nothing to do with the specific issue you are addressing
    here.
  7. Advertising must be clearly labeled as advertising and kept
    separate
    from editorial content.


    Ditto.
  8. If online shopping is involved,
    advertisers
    must require parental permission prior to purchase. Parents will be
    able
    to cancel an order mistakenly sent by a minor at no charge to the
    parent.


    The standards here should be the same as they are anywhere else.
    Use of
    a credit card is deemed to be an indication of adult status.
  9. If an
    advertiser communicates with a child by e-mail, the parent should
    be notified
    and should have the option, with each mailing, to discontinue
    mailings.


    If you want to disallow communications with children by advertisers, I
    might consider that a good goal. However, “on the internet no one
    knows
    your a dog”. It’s impossible to tell whether you are communicating
    with
    a child on the internet. As for the ability to remove yourself from
    commercial
    mailings–go for it, but this is a general issue, not one specific to
    children’s/parent’s rights.
    Frankly I find the whole concept of a
    “Parent’s
    Bill of Rights” to be misguided. First we need to construct a Parent’s
    Bill of Responsibilities. For the past 15 years my closing email
    signature
    has been the same. And every year I feel it is more and more
    appropriate.
    “I’m not sure which upsets me more; that people are so unwilling to
    accept
    responsibility for their actions, or that they are so eager to
    regulate
    everyone else’s.”

Privacy Distribution Mechanisms

I originally wrote this article in 1997 and posted it to my “blog” (back then I called it a ‘zine) as the first entry. As such the links are horribly out of date, and the formatting is a bit rigid. Fortunately, the OPS system described here died of neglect. But I’m sure it will come back in one form or another.

Kee Hinckley – Sept 14, 2005

Privacy Distribution Mechanisms

When does a privacy enhancement
become a privacy distribution mechanism?
In
the guise of providing greater user privacy, Netscape, Microsoft and Firefly
have greatly increased the consumer information that will be available to
web sites.

A few months ago Netscape,
Microsoft
and Firefly together
announced a new initiative, the Open Profiling System (OPS) aimed at quelling
user fears over privacy invasions on the internet. It was a great success
(from a PR standpoint at least, implementation lags announcement, as usual).
The press picked it up and reported on it widely, but nowhere did anyone
seem to examine what this will really mean when it is deployed.

 
The Open Profiling
Standard (OPS)

is
a proposed standard which enables the trusted exchange of profile
information between individuals and Web sites, with built in privacy
safeguards. Firefly, Netscape, and Microsoft will work together
on the OPS proposal during the remainder of the standards review
process of the World Wide Web Consortium (W3C).

OPS is designed to enable personalized
electronic commerce, content and communication while providing
a framework for the individual’s privacy. OPS gives each person
complete control over the exchange and usage of their personal
information across the Web and also saves them valuable time
since they only have to enter their information once.

OPS offers Web sites a greater understanding
of their audiences therefore dramatically improving personalized
online content, marketing and commerce.

Original link
was to
http://www.firefly.net/OPS/index.html,
the site has since reorganized.

Internet
Magazine
“OPS brings us
one step closer to market-based solutions for privacy protection,”
says Christine Varney, former commissioner of the Federal Trade
Commission (FTC)

Information
Week
The key component of
the proposed standard is the ability for users to manage how much
information their browser gives out and to whom particular information
is given.

Jesse
Berst/AnchorDesk
What you may not know
is that the industry already has an excellent solution: the “Open
Profiling Standard” (OPS).

Computer
Shopper
“OPS is a great
first step,” Gaddis says. “It raises consumer awareness
and allows consumers to protect themselves against the few bad
eggs that are present with any transaction.”
  But before we get into that, let’s step back for a moment and look at
the whole issue of privacy on the internet. This is an area fraught with
emotion, and greatly lacking in hard analysis.
When the web began, no one was thinking much about privacy. The HTTP
protocol provided a way for a browser to specify the identity of the user,
and many browsers sent that information, either in the form of an email
address, or just the initial account name. The server happily collected
the information and logged it in the log files. Early web servers even
had code which could be used to connect back to the sender’s computer
and (depending on the type of computer and the software running there)
verify the actual identity of the user (IDENTD).
These features were primarily used for tracking how many users (as opposed
to browser “hits”) had visited a site, and for contacting someone
who was apparently having trouble (lots of hits to mispelled pages or
some such) and helping them out. Those were the innocent days.
As web use increased, some people started realizing that they didn’t
really want every site they browsed to know who they were. People complained,
and the browser authors stopped sending the user identity. The log files
stopped receiving that information (although the empty identity field
still resides there–filled in only if the user provides a username and
password for a secure site).
Some time thereafter, two new information sources became available to
web site developers. Some browsers began sending a “referer
field–a piece of information that indicates the URL that the user was
viewing prior to reaching the current web page, and the Netscape browser
(followed by others) began allowing sites to stash a small “cookie
that would be remembered for a specified period of time, and retrieved
any time the same site asked for it. Although cookies get all the press,
the referer field is actually the only feature capable of exposing personal
information that you’d rather not reveal. But this whole issue has everything
to do with emotion, and very little to do with facts. Let’s look at the
two features.
Cookies
A “cookie” is a computer term for a small piece of information
that gets tucked away somewhere by a program for future retrieval. Sometimes
they are called “magic cookies”. The name implies an informal
storage mechanism, and typically cookies aren’t explicitly stored by the
user, they general contain internal information that the program needs.
Programs use them all the time. When you restart a program and all the
windows come up in the same place as the last time you ran it, when you
bring up a search dialog in your word processor and the text of the last
item you searched for is sitting there pre-selected–those are all examples
of a program stashing away a cookie with some information in it. It didn’t
ask you if you wanted to save that information, it just stored it for
convenience’s sake. We don’t tend to think of those as privacy risks (although
if the last search you did was for “big fat boss”, and the next
person to use your computer is the aforementioned boss, you might think
otherwise).
The cookies stored by your browser are no different. When you go to a
web site, it has the option of asking your browser to store some information
about your session so that it can access it at some future date. That
information is usually a session identifier, or some other data that will
enable the site to recognize you when you return. The site may use it
to remember your login information, or pre-fillin that complaint form
so you don’t have to do it again, or just track the happy fact that you
have returned to the site. The cookie does not, and can not, contain any
information that you haven’t already provided to the site. It also cannot
be passed to any other site, so the information you enter on one site
can not be snarfed by some other site.
Referer Fields
Referer fields are slightly different. What they tell a site is how you
got there. Within a site they are often used for tracking your movement
so that the user interface designers can look at how people are using
a site and modify the interface to better give people access to sections
that aren’t being visited. However what is usually of more interest is
the site that you were on before you came to this one. That gives site
owners an idea of which remote links are most useful and/or cost effective.
The catch is that browsers don’t just pass the referer field when you
click on a link, they also often pass it when you type in a URL. So it
is possible that sites will pick up the fact that the previous site you
were visiting was, shall we say, not one that you might like the world
to know you were visiting. It’s rather like stepping out of the adult
bookstore and bumping into your next door neighbor.
Oddly enough, though, the referer fields have never really caught on
as a “privacy risk” in the press. So be it.
Selling Yourself
As you travel from one site to another on the web, you may be amazed
at how much is being given away for free. Research reports, news, travel
directions… the list goes on and on. And it’s all free! Sites that charge
money for access are few and far between.
Appearances can be deceiving. In fact there are many, many sites on the
web that are charging for access, it’s just that the currency isn’t what
you are used to. Instead of cash, the currency is personal information.
Information about your age, your sex, your marital status, your wealth.
Some sites are subtle (Lucent’s MapsOnUs
lets you use the site several times before it asks for some information
about you (couldn’t do that without cookies :-). Other sites barely let
you past the front page before insisting that you register. Other’s tempt
you with a contest
of some sort
. But the end result is the same, you’ve sold some part
of your electronic soul for access to the site. You’ve exchanged one sort
of information for another.
But what will those people do with that information? Will they sell it
to a mailing list? Will it be picked up by spammers? Will tons of junk
paper mail start arriving at work? These questions started the privacy
experts questioning the whole process, although in practice this is no
different than filling out a magazine’s bingo card (and usually far more
rewarding). In stepped Netscape, Microsoft, Firefly and others with the
OPS, a combination of two technologies and a business practice addressed
at giving users more control over their privacy–at least in theory.
The technologies are the vCard standard
from the Internet Mail Consortium, and
Digital
Certificates
(also known as X.509),
an IETF (Internet Engineering Task
Force) standard. The vCard standard specifies a format for storing and
exchanging personal information (typically the type found on a business
card, but it can cover just about anything). Digital Certificates provide
a mechanism for providing secure storage and transmition of identification
information–the driver’s license of the internet.
The business process that ties these together is a promise from companies
signing up for this standard that they will adhere to certain privacy
guidelines.

Web sites that
adopt OPS are strongly encouraged to adopt a recognized privacy
assurance program that includes third-party auditing, and to clearly
post their privacy policies on the site where visitors can see
them. In addition, consumers are cautioned not to release their
Personal Profile to any site that does not post its privacy policies
and submit to third-party auditing.

http://www.firefly.net/OPS/QandA.html


As business practices go, that one is pretty weak, and nothing that couldn’t
have been done without all this new technology. So what does the new technology
provide to enhance privacy?
Frankly, nothing. What the OPS does is let you only enter your personal
information only once, so that when a site asks for your information,
it becomes incredibly easy to provide it. Where before you might have
had to fill out a form with home and work addresses, sex, marital status,
income and the like. Now you can just hit the “Okay” button
on your browser and have all that information automatically sent to the
remote system. Where before you might have skipped the non-mandatory fields
in a form, now you’ll send them anyway, it’s not any harder.
In sum, the OPS is really a mechanism to make it easier for consumers
to tell vendors information about themselves. It provides no more control
over privacy information than the current “fill out the form”
mechanism, and is far more likely to increase the distribution of personal
information to multiple companies. It’s not a “bad” technology
in any sense, but the PR that it has gotten is deceptive–OPS does nothing
to enhance privacy.