{"id":94503,"date":"2013-09-05T00:00:10","date_gmt":"2013-09-05T05:00:10","guid":{"rendered":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/"},"modified":"2024-04-14T04:17:27","modified_gmt":"2024-04-14T09:17:27","slug":"part-1-the-quest-for-anonymity-online","status":"publish","type":"post","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/","title":{"rendered":"Part 1: The Quest for Anonymity Online"},"content":{"rendered":"<p class=\"wp-block-paragraph\">In word and deed, most Americans would like the ability to be anonymous and untracked online at least every once in a while.<\/p>\n\n<p class=\"wp-block-paragraph\">A clear majority\u201459%\u2014say that people should have the ability to use the internet completely anonymously. When internet users are directly asked, 18% say they use the internet in a way that hides or masks their identity. Yet when a broader battery of activities about masking behavior or content is asked of respondents, 81% say they do at least one of these obscuring activities.<\/p>\n\n<p class=\"wp-block-paragraph\">All told, 86% of internet users have tried to be anonymous online and taken at least one step to try to mask their behavior or avoid being tracked. The most common strategy was to clear cookies and browser history. Yet, notable numbers have taken even more sophisticated steps, such as encrypting their email (done by 14% of internet users) or used \u00a0virtual personal network or proxy server, like Tor software[1. See\u00a0<a href=\"https:\/\/www.torproject.org\/\">https:\/\/www.torproject.org\/<\/a>], that does not allow firms to track their online movements (also done by 14% of internet users).<\/p>\n\n<p class=\"wp-block-paragraph\" style=\"text-align: center\">\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" alt=\"strategies to be less visible online\" src=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/media\/47BB71F82C7D4EA8B1DFB2E5E68D42E7.jpg\" width=\"528\" height=\"569\"><\/figure>\n<\/p>\n\n<p class=\"wp-block-paragraph\">The question of whether people should be allowed to use the internet anonymously was asked of all adults (not just internet users) and 34% of the general public (including 33% of internet users) said they did not believe people should be allowed to use the internet anonymously.<\/p>\n\n<p class=\"wp-block-paragraph\">There are noteworthy demographic and political differences in the answers to this question. Those most likely to say that people should have the ability to go online anonymously include: men, those under the age of 65, those who live in urban areas, and liberal Democrats. In addition, those who are employed are more likely than non-workers to believe internet use should be allowed to be anonymous. Across the board, technology users were more likely than non-users to say this: that includes internet users v. non-users, cell users v. non-users, and social media users v. non-users.<\/p>\n\n<h4 id=\"who-has-taken-steps-to-mask-their-identity-or-avoid-being-observed-online\" class=\"wp-block-heading\">Who has taken steps to mask their identity or avoid being observed online<\/h4>\n\n<p class=\"wp-block-paragraph\">In this survey, 81% of adults are internet users; 90% of adults are cell phone owners; and 53% of adults are smartphone owners. The internet users and smartphone owners were asked a battery of questions about the strategies online Americans might use to hide their identity or otherwise mask them from others who might want to observe their online behavior.<\/p>\n\n<p class=\"wp-block-paragraph\">In all, 81% of internet users or smartphone owners said they had employed at least one of the eleven strategies we queried. Many had employed multiple strategies. The average anonymity seeker had used between 3 and 4 of these strategies at one time or another.<\/p>\n\n<p class=\"wp-block-paragraph\">The most consistent differences in masking strategies are tied to age. The youngest adults (those ages 18-29) are more likely than their elders to take steps to be hidden online, as the chart below shows. The one activity where the differences did not show up in a stark way involved encrypting email. Internet users of all ages under 65 were equally likely to have done that.<\/p>\n\n<p class=\"wp-block-paragraph\" style=\"text-align: center\">\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" alt=\"young adults are most likely to use most strategies to be less visible onlineq\" src=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/media\/5109979049224BAD9C303D0BDA9563E3.jpg\" width=\"529\" height=\"505\"><\/figure>\n<\/p>\n\n<p class=\"wp-block-paragraph\">Other notable differences relate to educational attainment. Those who have a college or graduate education are more likely than those who have not gone to college to have cleared their cookie and browser history, disabled cookies, decided not to use a website because it had asked for their name, encrypted their email, and used a proxy server or VPN.<\/p>\n\n<h4 id=\"users-bounce-back-and-forth-between-disclosing-who-they-are-and-remaining-anonymous\" class=\"wp-block-heading\">Users bounce back and forth between disclosing who they are and remaining anonymous<\/h4>\n\n<p class=\"wp-block-paragraph\">When users post material online, they are more likely than not to attach their name or a recognizable screenname to their material: 49% of internet users say they have used their real name and 47% use a screenname or username that people associate with them. At the same time, 25% of internet users say that they have posted material without revealing who they are.<\/p>\n\n<p class=\"wp-block-paragraph\">The most consistent pattern in these findings is that younger adults who use the internet tend to do all three things at greater rates than those who are 30 or older\u2014use their real names; use a recognizable screenname, and post without disclosing who they are. This undoubtedly relates to the fact that younger users tend to be more frequent users of the internet and share more content than older users.<\/p>\n\n<p class=\"wp-block-paragraph\" style=\"text-align: center\">\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" alt=\"young adults are most likely to use all three strategies when they post material\" src=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/media\/3B5BFEE9262A42A9A42CCAEFAB034044.jpg\" width=\"530\" height=\"492\"><\/figure>\n<\/p>\n\n<p class=\"wp-block-paragraph\">Beyond the differences tied to age, online women are more likely than online men to say they have used their real name when they post material (55% vs. 43%).<\/p>\n\n<h4 id=\"most-do-not-think-it-is-possible-to-be-completely-anonymous-online-though-a-healthy-minority-believe-they-can-be-totally-hidden\" class=\"wp-block-heading\">Most do not think it is possible to be completely anonymous online, though a healthy minority believe they can be totally hidden<\/h4>\n\n<p class=\"wp-block-paragraph\">Even though many wish to be anonymous and have taken steps to obscure their online activities at least occasionally, they do not necessarily think it is possible to be completely anonymous online.<\/p>\n\n<p class=\"wp-block-paragraph\">All of the adults in our sample were asked: Considering everything you know and have heard about the internet, do you think it is possible for someone to use the internet completely anonymously \u2013 so that none of their online activities can be easily traced back to them? Just 37% of them said they thought it was possible to be completely anonymous and 59% said it was not possible. And internet users held exactly the same views.<\/p>\n\n<p class=\"wp-block-paragraph\">The most striking differences on this question were between men and women. While majorities in both genders do not think it is possible to be completely anonymous online, women were more likely than men to say it is not possible to be completely anonymous online (64% vs. 54%).<\/p>\n\n<p class=\"wp-block-paragraph\">We also asked a specific question about anonymous posting online. Internet users were asked: Suppose you said something critical about a product online, and you didn\u2019t use your real name. How easy do you think it would be for the company to find out who you are anyway? Most thought it would not be terribly hard for the company to track them down.<\/p>\n\n<ul class=\"wp-block-list\">\n<li>42% said would be \u201cvery easy\u201d for the company to find out who they were.<\/li>\n<li>37% said it would be \u201csomewhat easy\u201d for the company to find who they were.<\/li>\n<li>13% said it would be \u201cnot too easy\u201d for the company to find who they were.<\/li>\n<li>3% said it would be \u201calmost impossible\u201d for the company to find who they were. (And 5% said they did not know.)<\/li>\n<\/ul>\n\n<p class=\"wp-block-paragraph\">Those who had not taken any steps to obscure their online activities were much more likely to say it would be \u201cvery easy\u201d for a company to trace them (56% said so).<\/p>\n\n<p class=\"wp-block-paragraph\">\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>In word and deed, most Americans would like the ability to be anonymous and untracked online at least every once in a while. A clear majority\u201459%\u2014say that people should have the ability to use the internet completely anonymously. When internet users are directly asked, 18% say they use the internet in a way that hides [&hellip;]<\/p>\n","protected":false},"author":139,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sub_headline":"","sub_title":"","_crdt_document":"","_prc_public_revisions":[],"_ppp_expiration_hours":0,"_ppp_enabled":false,"ai_generated_summary":"","relatedPosts":[],"reportMaterials":[],"multiSectionReport":[],"package_parts__enabled":false,"package_parts":[],"_prc_fork_parent":0,"_prc_fork_status":"","_prc_active_fork":0,"datacite_doi":"","datacite_doi_citation":"","_prc_seo_qr_attachment_id":0,"spoken_article_player_enabled":true,"bylines":[],"acknowledgements":[],"displayBylines":true,"footnotes":"","prc_watchers":[]},"categories":[],"tags":[],"bylines":[],"collection":[],"datasets":[],"level_of_effort":[],"primary_audience":[],"information_type":[],"_post_visibility":[],"formats":[458],"_fund_pool":[],"languages":[],"regions-countries":[],"research-teams":[526],"workflow-status":[],"class_list":["post-94503","post","type-post","status-publish","format-standard","hentry","formats-report","research-teams-internet"],"label":false,"post_parent":94519,"word_count":1052,"canonical_url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/","art_direction":false,"_embeds":[],"watchers":[],"table_of_contents":[{"id":94519,"title":"Anonymity, Privacy, and Security Online","slug":"anonymity-privacy-and-security-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/anonymity-privacy-and-security-online\/","is_active":false},{"id":94503,"title":"Part 1: The Quest for Anonymity Online","slug":"part-1-the-quest-for-anonymity-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/","is_active":true},{"id":94510,"title":"Part 2: Concerns About Personal Information Online","slug":"part-2-concerns-about-personal-information-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-2-concerns-about-personal-information-online\/","is_active":false},{"id":94494,"title":"Part 3: Who Internet Users are Trying to Avoid; the Information They Want to Protect","slug":"part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect\/","is_active":false},{"id":94498,"title":"Part 4: How Users Feel About the Sensitivity of Certain Kinds of Data","slug":"part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data\/","is_active":false},{"id":94491,"title":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage","slug":"part-5-online-identity-theft-security-issues-and-reputational-damage","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/","is_active":false},{"id":94530,"title":"Methods","slug":"methods-10","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/methods-10\/","is_active":false}],"report_materials":"","report_pagination":{"current_post":{"id":94503,"title":"Part 1: The Quest for Anonymity Online","slug":"part-1-the-quest-for-anonymity-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/","is_active":true,"page_num":2},"next_post":{"id":94510,"title":"Part 2: Concerns About Personal Information Online","slug":"part-2-concerns-about-personal-information-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-2-concerns-about-personal-information-online\/","is_active":false,"page_num":3},"previous_post":{"id":94519,"title":"Anonymity, Privacy, and Security Online","slug":"anonymity-privacy-and-security-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/anonymity-privacy-and-security-online\/","is_active":false,"page_num":1},"pagination_items":[{"id":94519,"title":"Anonymity, Privacy, and Security Online","slug":"anonymity-privacy-and-security-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/anonymity-privacy-and-security-online\/","is_active":false,"page_num":1},{"id":94503,"title":"Part 1: The Quest for Anonymity Online","slug":"part-1-the-quest-for-anonymity-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/","is_active":true,"page_num":2},{"id":94510,"title":"Part 2: Concerns About Personal Information Online","slug":"part-2-concerns-about-personal-information-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-2-concerns-about-personal-information-online\/","is_active":false,"page_num":3},{"id":94494,"title":"Part 3: Who Internet Users are Trying to Avoid; the Information They Want to Protect","slug":"part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect\/","is_active":false,"page_num":4},{"id":94498,"title":"Part 4: How Users Feel About the Sensitivity of Certain Kinds of Data","slug":"part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data\/","is_active":false,"page_num":5},{"id":94491,"title":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage","slug":"part-5-online-identity-theft-security-issues-and-reputational-damage","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/","is_active":false,"page_num":6},{"id":94530,"title":"Methods","slug":"methods-10","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/methods-10\/","is_active":false,"page_num":7}]},"parent_info":{"parent_title":"Anonymity, Privacy, and Security Online","parent_id":94519},"materialsOrdered":[],"chaptersOrdered":[],"partsOrdered":[],"partsEnabled":false,"datacite_doi":"","prc_seo_data":{"title":"Part 1: The Quest for Anonymity Online","description":"In word and deed, most Americans would like the ability to be anonymous and untracked online at least every once in a while. A clear majority\u201459%\u2014say that people should have&hellip;","og_title":"Part 1: The Quest for Anonymity Online","og_description":"","schema_type":"Article","noindex":false,"canonical_url":"","primary_terms":[],"custom_schema":[],"og_image":0,"indexnow_submitted_at":null,"gsc_index_status":null},"prepublish_checks":{"prc-image-alt-text":{"status":"complete","message":"No image blocks in content.","data":null},"prc-about-this-research":{"status":"incomplete","message":"Add an \"About this research\" details block.","data":null},"prc-paragraph-count":{"status":"complete","message":"Found 17 paragraphs.","data":{"count":17}},"prc-internal-link":{"status":"incomplete","message":"Add at least one internal link.","data":{"count":0}}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"relatedPostsOrdered":[],"bylinesOrdered":[],"acknowledgementsOrdered":[],"_links":{"self":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/94503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/comments?post=94503"}],"version-history":[{"count":2,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/94503\/revisions"}],"predecessor-version":[{"id":136602,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/94503\/revisions\/136602"}],"wp:attachment":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/media?parent=94503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/categories?post=94503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/tags?post=94503"},{"taxonomy":"bylines","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/bylines?post=94503"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/collection?post=94503"},{"taxonomy":"datasets","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/datasets?post=94503"},{"taxonomy":"level_of_effort","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/level_of_effort?post=94503"},{"taxonomy":"primary_audience","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/primary_audience?post=94503"},{"taxonomy":"information_type","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/information_type?post=94503"},{"taxonomy":"_post_visibility","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_post_visibility?post=94503"},{"taxonomy":"formats","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/formats?post=94503"},{"taxonomy":"_fund_pool","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_fund_pool?post=94503"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/languages?post=94503"},{"taxonomy":"regions-countries","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/regions-countries?post=94503"},{"taxonomy":"research-teams","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/research-teams?post=94503"},{"taxonomy":"workflow-status","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/workflow-status?post=94503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}