70
edits
Line 36: | Line 36: | ||
== The Pseudonymous Blogger == | == The Pseudonymous Blogger == | ||
The pseudonymous blogger maintains a politically or technically controversial blog that may expose them to subpoena risk to uncover their identity. There have been several cases of Apple in particular demanding the identity of bloggers blogging about unreleased or otherwise secret product releases or features. Bloggers in China and other countries also face risk of attempts to identify them. | |||
If operating in the United States, this user is likely not concerned about | |||
This user may use public wifi or a proxy to access the Internet, as opposed to their normal Internet connection. | |||
This user may wish to preserve their "Anonymous mode" cookies beyond a single session, but does not want them mixing with their normal cookies. They may have a seperate Facebook, twitter, and other social media accounts for their blogging persona, in addition to their regular persona. | |||
== The Abuse Victim == | == The Abuse Victim == |
edits