<s>
This	O
anonymity	O
is	O
an	O
important	O
factor	O
in	O
crowd	O
psychology	O
,	O
and	O
behavior	O
in	O
situations	O
such	O
as	O
a	O
riot	B-Device
.	O
</s>
<s>
Many	O
loyalty	O
programs	O
use	O
cards	O
that	O
personally	O
identify	O
the	O
consumer	O
engaging	O
in	O
each	O
transaction	O
(	O
possibly	O
for	O
later	O
solicitation	O
,	O
or	O
for	O
redemption	O
or	O
security	O
purposes	O
)	O
,	O
or	O
that	O
act	O
as	O
a	O
numerical	O
pseudonym	O
,	O
for	O
use	O
in	O
data	B-Application
mining	I-Application
.	O
</s>
<s>
For	O
example	O
,	O
when	O
committing	O
unlawful	O
actions	O
,	O
many	O
criminals	O
attempt	O
to	O
avoid	O
identification	O
by	O
the	O
means	O
of	O
obscuring/covering	O
their	O
faces	O
with	O
scarves	O
or	O
masks	O
,	O
and	O
wear	O
gloves	B-General_Concept
or	O
other	O
hand	O
coverings	O
in	O
order	O
to	O
not	O
leave	O
any	O
fingerprints	B-Algorithm
.	O
</s>
<s>
In	O
the	O
United	O
States	O
,	O
disclosure	O
of	O
identity	O
is	O
required	O
to	O
be	O
able	O
to	O
vote	O
,	O
though	O
the	O
secret	B-Application
ballot	O
prevents	O
disclosure	O
of	O
individual	O
voting	O
patterns	O
.	O
</s>
<s>
Sometimes	O
archival	O
research	O
later	O
identifies	O
the	O
name	O
,	O
as	O
when	O
the	O
"	O
Master	O
of	O
Flémalle	O
"	O
—	O
defined	O
by	O
three	O
paintings	O
in	O
the	O
Städelsches	O
Kunstinstitut	O
in	O
Frankfurt	O
—	O
was	O
identified	O
as	O
Robert	B-Protocol
Campin	O
.	O
</s>
<s>
Wikipedia	O
is	O
collaboratively	O
written	O
mostly	O
by	O
authors	O
using	O
either	O
unidentifiable	O
pseudonyms	O
or	O
IP	B-Protocol
address	I-Protocol
identifiers	O
,	O
although	O
a	O
few	O
have	O
used	O
identified	O
pseudonyms	O
or	O
their	O
real	O
names	O
.	O
</s>
<s>
However	O
,	O
the	O
Internet	O
was	O
not	O
designed	O
for	O
anonymity	O
:	O
IP	B-Protocol
addresses	I-Protocol
serve	O
as	O
virtual	O
mailing	O
addresses	O
,	O
which	O
means	O
that	O
any	O
time	O
any	O
resource	O
on	O
the	O
Internet	O
is	O
accessed	O
,	O
it	O
is	O
accessed	O
from	O
a	O
particular	O
IP	B-Protocol
address	I-Protocol
,	O
and	O
the	O
data	O
traffic	O
patterns	O
to	O
and	O
from	O
IP	B-Protocol
addresses	I-Protocol
can	O
be	O
intercepted	O
,	O
monitored	O
,	O
and	O
analysed	O
,	O
even	O
if	O
the	O
content	O
of	O
that	O
traffic	O
is	O
encrypted	O
.	O
</s>
<s>
This	O
address	O
can	O
be	O
mapped	O
to	O
a	O
particular	O
Internet	O
Service	O
Provider	O
(	O
ISP	O
)	O
,	O
and	O
this	O
ISP	O
can	O
then	O
provide	O
information	O
about	O
what	O
customer	O
that	O
IP	B-Protocol
address	I-Protocol
was	O
leased	O
to	O
.	O
</s>
<s>
Anonymizing	O
services	O
such	O
as	O
I2P	B-Protocol
and	O
Tor	B-Application
address	O
the	O
issue	O
of	O
IP	O
tracking	O
.	O
</s>
<s>
Sites	O
such	O
as	O
Chatroulette	O
,	O
Omegle	O
,	O
and	O
Tinder	B-Application
(	O
which	O
pair	O
up	O
random	B-Operating_System
users	O
for	O
a	O
conversation	O
)	O
capitalized	O
on	O
a	O
fascination	O
with	O
anonymity	O
.	O
</s>
<s>
Apps	O
like	O
Yik	B-Application
Yak	I-Application
,	O
Secret	B-Application
and	O
Whisper	B-Application
let	O
people	O
share	O
things	O
anonymously	O
or	O
quasi-anonymously	O
whereas	O
Random	B-Operating_System
let	O
the	O
user	O
to	O
explore	O
the	O
web	O
anonymously	O
.	O
</s>
<s>
Other	O
sites	O
,	O
however	O
,	O
including	O
Facebook	B-Application
and	O
Google+	B-Application
,	O
ask	O
users	O
to	O
sign	O
in	O
with	O
their	O
legal	O
names	O
.	O
</s>
<s>
In	O
the	O
case	O
of	O
Google+	B-Application
,	O
this	O
requirement	O
led	O
to	O
a	O
controversy	O
known	O
as	O
the	O
nymwars	O
.	O
</s>
<s>
"	O
Cyberbullying	O
,	O
as	O
opposed	O
to	O
general	O
bullying	O
,	O
is	O
still	O
a	O
widely-debated	O
area	O
of	O
Internet	B-Application
freedom	I-Application
in	O
several	O
states	O
.	O
</s>
<s>
This	O
is	O
frequently	O
applied	O
in	O
fiction	O
,	O
from	O
The	B-Device
Lone	I-Device
Ranger	I-Device
,	O
Superman	B-Application
,	O
and	O
Batman	B-General_Concept
,	O
where	O
a	O
hidden	O
identity	O
is	O
assumed	O
.	O
</s>
