Surety is performing system maintenance this weekend. Electronic date stamps on new Prior Art Database disclosures may be delayed.
Browse Prior Art Database

Social Media Anonymizer

IP.com Disclosure Number: IPCOM000248504D
Publication Date: 2016-Dec-09
Document File: 2 page(s) / 22K

Publishing Venue

The IP.com Prior Art Database


Described is a system that enables people to actively use social media in a way that prevents profiling.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 54% of the total text.


Social Media Anonymizer

Recent developments in technology have made it possible to profile a person who is active on

social media networks by algorithmically analyzing their posts and other content created by them.

Algorithmic analysis can identify the poster's location, gender, level of education, personality

profile, income, etc.

Currently, all social media sites and tools that can be used to post to social media sites

allow people to register anonymously using any email address. They do not provide any means to

alter the text of a post to make profiling impossible. In some situations, it is desirable to be able

to use social media anonymously; e.g., for political activists in areas where free speech is limited

to prevent detection, identification, and possible retaliation through an oppressive regime.

Described here is a system that enables people to actively use social media in a way that prevents

profiling. It provides various means to prevent others from determining personally identifiable

information, such as:

- personality/character traits

- location

- level of education

- identity

- gender

- income

- etc.

Posting to the social media is done through a proxy offering a number of services. Using

a proxy and modifying the user-provided text prevents others from successfully profiling the

user. This system acts as a proxy to the social network site the user wants to post to. The proxy

can be accessed through various means and devices; e.g., through a website or a dedicated

application for either mobile or desktop computing devices. Described below is how the social

media anonymizer proxy would be used via a website.

1) When they first visit the social media anonymizer website, the user needs to create a user ID

and password.

2) The user logs in using their user ID and password.

3) The user selects to which social network they want to post.

4) The user selects the social media account they want to use to post to the social network. If they

do not have an account with the selected social network, they can choose to have...