Feeds

Google's anonymity ban defied by Thomas Jefferson

'Twas commentards defeated the Brits

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Open...and Shut The technology world loves to navel-gaze and think it's constantly breaking new ground, but as in the case of the recent debate over real names and anonymity on Google+, technology often plods over well-trodden ground.

For example, if you dropped one of the American republic's "founding fathers" into the midst of the Google+ brouhaha, he'd feel right at home. Unfortunately.

Let me explain. In case you missed it, Google has been under fire for its policy requiring that people use their real names on its Google+ social networking service.

There are plenty of good reasons to use pseudonyms, as others have pointed out, but because Google intends Google+ to be an identity service, all of these reasons take a back seat to establishing a credible online identity.

As venture capitalist Fred Wilson points out, this suggests that the identity service is intended to benefit Google, not Google+ users, an observation that is almost certainly correct.

To a point, anyway. After all, there are other good reasons to dump anonymity on the web, as I've argued. Anyone who has ever taken the trouble to blog knows this well. Anonymity encourages cowardice masquerading as bravado. It gets really old, really fast.

It's not, however, anything new.

I've been reading Ron Chernow's exceptional Washington: A Life and have been struck by how venomous the press was in the days of the early republic – and how it was made more so by the common practice of prominent men taking pseudonyms to launch near-sadistic attacks on their opposition.

This wasn't just relegated to the rabble of 18th Century America, either. Washington's own cabinet member, Thomas Jefferson, was one of his harshest anonymous critics, along with James Madison and others among the founding fathers. The attacks were often willfully false, cruel, and only possible because of their anonymous nature. Jefferson, indeed, opted to launch his attacks through intermediaries, rather than sully his own hands.

However, the same anonymity that drove Washington to distraction (and an earnest desire to leave office after just one term, though he was persuaded to remain for two) was also critical in fostering the republic in the first place.

Alexander Hamilton, James Madison, and John Jay used pseudonyms to argue the case for a constitution and a harmonizing of interests in a grand republic, rather than a weak federation of sovereign states. They needed anonymity to be able to argue freely, allowing their arguments to be decoupled from the actual people advancing them.

Indeed, this Janus-faced anonymity problem/opportunity is well-expressed by Madison's writings. He did profound good with anonymity in the Federalist Papers, and then put anonymity to destructive use against Washington throughout his presidency.

As much as I hate the bile that web anonymity encourages, it's the price we have always paid to ensure free speech. Sometimes that speech is hateful and wrong. But that isn't sufficient justification to close mouths to establish a marketing bonanza for Google – or anyone else.

All of which, by the way, suggests that Facebook may have already won. There, people voluntarily use their real names because that's the foundation for finding their friends. A more impersonal service like Google+, which tries to blend the more business-y broadcasting of Twitter with the ability to connect with friends tries too hard to be all things to all people, and so straddles the line between speech we might want to keep anonymous and speech that only happens when we're "real".

It may be a bridge too far for Google+, which will suit Facebook just fine. ®

Matt Asay is senior vice president of business development at Strobe, a startup that offers an open source framework for building mobile apps. He was formerly chief operating officer of Ubuntu commercial operation Canonical. With more than a decade spent in open source, Asay served as Alfresco's general manager for the Americas and vice president of business development, and he helped put Novell on its open source track. Asay is an emeritus board member of the Open Source Initiative (OSI). His column, Open...and Shut, appears twice a week on The Register.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.