Credit: Thinkstock There was quite a ruckus a month ago surrounding Facebook’s effort to crack down on pseudonyms, which affected a lot of performers, transgender people, Native Americans, Hawaiians and others with “alternate” or “unusual” names. Was this truly the end of Facebook’s Nymwars or is there more to this story?After the noise died down, I was among the many who thought the rules had been relaxed so that it was a non-issue for anyone who was not using a pseudonym maliciously. But I recently learned that there are plenty of people who wish to remain under the radar that are still being affected by these stringent naming rules.Anonymity vs. privacyMost of us have seen or experienced the effects of online harassment, so the idea of forcing trolls out of anonymity makes a certain amount of sense. But what one person might call anonymity another might simply call privacy. As a malware analyst, it was part of my daily work to arbitrate between software makers and end users as to whether a piece of software was legitimate, “potentially unwanted”, or malicious. The line between a legitimate administration tool and a hack tool was often vanishingly thin; sometimes we had to create thorough documentation for our legal department in case our decision was called into question. We very much wanted to protect the general population from harm; including both those people developing the software and those who found this software on their machines. This is a difficult balancing act, compounded by the unbelievable numbers of files we were asked to examine.Having undergone this sort of decision thousands of times over the course of a decade, I understand what a difficult task this is both for the people making policy and those making specific verification decisions about users’ “authentic” names. Deciding when people are doing something to try to deceitfully hide their identities versus cautiously protecting their privacy is not an easy thing to do. And undoubtedly, there are mountains of submissions for decision-makers to sift through. Keeping your personal life privateAs you might imagine, there was a precipitating event that prompted me to look into this issue: A message popped up on my Facebook feed from the husband of a childhood friend saying that his wife’s account had been locked due to her use of an alias. My friend is a both a social worker and a domestic abuse survivor, and I knew that she chose to use an alias because the idea had been suggested to her by her employer.This advice seems to be pretty common among social workers. Healthcare professionals also commonly use pseudonyms (in spite of advice to avoid social media altogether), so that they can use social media to keep up with family and friends without having the dilemma of having to field friend requests from patients. While creating a public page allows many people to maintain a separate professional persona, it is a one-way street that does not allow the full range of activity including commenting on other peoples’ pages.The more Facebook sets itself up to be an indispensable part of modern life, the more often this scenario is likely to occur. It would seem absurd to tell doctors, nurses and social workers that they should not have a personal email address, and yet prohibitions against pseudonyms on Facebook create a near-equivalent restriction for many people. Protecting the innocentIt’s not just people who prefer to have their personal and professional lives separate that seek to protect their privacy by using alternate names. There are plenty of other situations in which it would be problematic or even dangerous to have a person’s legal name associated in any way with their Facebook page, including survivors of abuse, stalking, and harassment. Indeed, using an alternate moniker may even reduce the risk of these troubles for some people. Excluding survivors from social networks removes a safety net as well as a source of emotional connection and support. Asking them to reveal their real names makes the risk of using the site too great, especially when the verification process includes submitting identification that may reveal their home addresses. And nowhere in the amended ID verification rules does Facebook take account of this. (Not to mention, almost every one of the suggested documents contains way more personally identifiable information than I would recommend sending to a website!) If Facebook wishes to continue to integrate ever more tightly into everyone’s daily life, both as a social hub and as a third party authenticator, they will not only need to accommodate people in various parts of the world and in various cultures. They will also need to take into account that people with different jobs and different life-situations will require less exclusionary ways to interact with their site. Related content opinion Of mice and malware Some of the most important training I got for a career in computer security research was not from a computer-related class, but in a biology class. While these two disciplines may seem entirely unrelated, the skills that are needed in both cases can By Lysa Myers Jul 03, 2019 6 mins Malware IT Skills Staff Management opinion Have we doubled the number of women in infosec? According to a recent (ISC)2 report, women now comprise 20% of cybersecurity workers. But without defining what jobs are being included, it’s unclear whether we’re truly making progress. By Lysa Myers Feb 11, 2019 5 mins Technology Industry IT Skills Staff Management opinion Has the word ‘breach’ has outlived its usefulness? When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of “brea By Lysa Myers Nov 28, 2018 5 mins Data Breach Technology Industry Data Privacy opinion Stop training your employees to fall for phishing attacks Training your employees how to recognize and avoid phishing only works if trusted emails don’t look the same as criminals'. By Lysa Myers Jul 10, 2018 4 mins Phishing Social Engineering Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe