Old Miraheze Wiki Pages:IDOE FakeIdentity Intro: Difference between revisions
THIS>Liaochina Make changes on page source to adjust paragraph indentation |
m 5 revisions imported: Import the dump of the "LI AO's Wiki (Miraheze)" wiki. |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 3: | Line 3: | ||
== Background of Using Fake Identity == | == Background of Using Fake Identity == | ||
Debates on the usage of fake identities in various fields form to become a common topic of the modern society. Starting from late 2021, Li Ao has leveraged the use of fake identities to satisfy the needs of online protection. Upholding the ethics principles lays down to be Li Ao's core principles, and he acknowledges that such use of fake identities together with information technology tools to maintain certain degree of anonymous should be regulated to ensure common interests are not compromised because of his such exercises. | Debates on the usage of fake identities in various fields form to become a common topic of the modern society. Starting from late 2021, Li Ao has leveraged the use of fake identities to satisfy the needs of online protection. Upholding the ethics principles lays down to be Li Ao's core principles, and he acknowledges that such use of fake identities together with information technology tools to maintain certain degree of anonymous should be regulated to ensure common interests are not compromised because of his such exercises. | ||
This phrase of IDOE article also covers the use of fake electronic device identities, including fake IMEI of mobile devices and proxy/VPN IP addresses for disguising. IP addresses from reputable proxy/VPN providers aren't included. | |||
Under certain circumstances when the use of fake identity no longer remains to be the only way Li Ao can choose to protect his interests against identity attacks such as impersonation, unconditional access of privacy-related information and other kinds of cyber crimes, Li Ao will actively implement the use of other measures to satisfy such the needs. | Under certain circumstances when the use of fake identity no longer remains to be the only way Li Ao can choose to protect his interests against identity attacks such as impersonation, unconditional access of privacy-related information and other kinds of cyber crimes, Li Ao will actively implement the use of other measures to satisfy such the needs. | ||
Line 9: | Line 11: | ||
Currently, scope of Li Ao's use of fake identity including, but not limited to, the following: | Currently, scope of Li Ao's use of fake identity including, but not limited to, the following: | ||
:-- to ensure the excessive control of state power will not affect the privacy of his online privacy; | |||
:-- to ensure his online activity will not contribute to any unethical commercial or research purposes; | |||
:-- to ensure his fundamental human rights of privacy is not violated under course of unnecessary information use, and | |||
:-- to promote ethical use of fake identity under situations where such use is necessary and important. | |||
Under critical situations where the severity creates grounds of reasonable use of fake identity and such use of fake identity will significantly degrade the severity, Li Ao may eliminate such use for a certain period of time. Upon the severity has degraded to a certain degree where maintaining such use is no longer necessary, continued use must be terminated unless another reasonable use lingers. | Under critical situations where the severity creates grounds of reasonable use of fake identity and such use of fake identity will significantly degrade the severity, Li Ao may eliminate such use for a certain period of time. Upon the severity has degraded to a certain degree where maintaining such use is no longer necessary, continued use must be terminated unless another reasonable use lingers. | ||
Line 24: | Line 26: | ||
|- | |- | ||
|Announce or produce fake identities including name, nationality, sex, date of birth, Chinese National Identity Card number, Chinese mobile phone number, and other personal particulars Chinese state authorities may heavily use to identity a singular person, on any IT systems including online services operated on the Internet where Chinese state authorities may control access, or to any Chinese state authorities including state-owned mobile service operators and governmental service acceptance agencies | |Announce or produce fake identities including name, nationality, sex, date of birth, Chinese National Identity Card number, Chinese mobile phone number, and other personal particulars Chinese state authorities may heavily use to identity a singular person, on any IT systems including online services operated on the Internet where Chinese state authorities may control access, or to any Chinese state authorities including state-owned mobile service operators and governmental service acceptance agencies | ||
|To ensure privacy to be honoured and protected, no unethical data sharing to online platforms, no impersonations will be produced, and to ensure no contributions to any unethical business researches and/or | |To ensure privacy to be honoured and protected, no unethical data sharing to online platforms, no impersonations will be produced, and to ensure no contributions to any unethical business researches and/or studies | ||
|PF/G [Presentation of Fake Identity, General Purposes] | |PF/G [Presentation of Fake Identity, General Purposes] | ||
|- | |- | ||
Line 42: | Line 44: | ||
|To ensure fundamental human rights be honoured or respected | |To ensure fundamental human rights be honoured or respected | ||
|PMHR | |PMHR | ||
|- | |||
|Use Internet connection from residential broadband from VPN/proxy | |||
|To ensure privacy be preserved and honoured; to ensure no contributions to unethical business/academical researches and/or studies | |||
|PFIC [Presentation of Fake Internet Connection] | |||
|- | |||
|Use programmed IMEI number on GSM networks | |||
|To ensure privacy be preserved and honoured; to ensure no contributions to unethical business/academical researches and/or studies | |||
|PFDS [Presentation of Fake Device Serial Number] | |||
|} | |} | ||
Line 52: | Line 62: | ||
|- | |- | ||
|As Tencent service customer | |As Tencent service customer | ||
|PF/G, PFCM | |PF/G, PFCM, PFIC | ||
|Such use spans across different products including QQ, WeChat, and WeCom, etc. | |Such use spans across different products including QQ, WeChat, and WeCom, etc. | ||
|- | |- | ||
Line 60: | Line 70: | ||
|- | |- | ||
|As China Unicom customer | |As China Unicom customer | ||
|PF/G | |PF/G, PFDS | ||
|Such use covers announcements of phone service usages | |Such use covers announcements of phone service usages and uses of different fake IMEIs to disguise as phone holder of different models | ||
|} | |} | ||
Line 78: | Line 88: | ||
|PMHR | |PMHR | ||
|Planned use includes producing fake residential address documents to ensure banking services be accessible, circumventing excessive strict regulatory rules of the People's Bank of China and the Chinese government; such use does not include opening of accounts for money laundering, and other prohibited financial transactions where applicable laws applies | |Planned use includes producing fake residential address documents to ensure banking services be accessible, circumventing excessive strict regulatory rules of the People's Bank of China and the Chinese government; such use does not include opening of accounts for money laundering, and other prohibited financial transactions where applicable laws applies | ||
|- | |||
| | |||
| | |||
| | |||
|} | |||
== History of Used Fake Identity == | |||
{| class="wikitable" | |||
!Usage of Fake Identity | |||
!Refrence Code | |||
!Remarks | |||
|- | |||
|Producing fake documents for circumventing international remittance blockage of Chinese government, to Bank of China | |||
|PMHR | |||
|Fabricated documents presented to Bank of China as supplementary documents attesting foreign exchange usage. Because of excessive power of the current Chinese governance the government either expressed or implied bank institutions must keep details of detailed documents showing funds usage for every international emmitance. | |||
Fake documents provided to bank on 31/5/2024. | |||
|- | |||
| | |||
| | |||
| | |||
|- | |- | ||
| | | |
Latest revision as of 17:58, 28 September 2024
Background of Using Fake Identity
Debates on the usage of fake identities in various fields form to become a common topic of the modern society. Starting from late 2021, Li Ao has leveraged the use of fake identities to satisfy the needs of online protection. Upholding the ethics principles lays down to be Li Ao's core principles, and he acknowledges that such use of fake identities together with information technology tools to maintain certain degree of anonymous should be regulated to ensure common interests are not compromised because of his such exercises.
This phrase of IDOE article also covers the use of fake electronic device identities, including fake IMEI of mobile devices and proxy/VPN IP addresses for disguising. IP addresses from reputable proxy/VPN providers aren't included.
Under certain circumstances when the use of fake identity no longer remains to be the only way Li Ao can choose to protect his interests against identity attacks such as impersonation, unconditional access of privacy-related information and other kinds of cyber crimes, Li Ao will actively implement the use of other measures to satisfy such the needs.
Scope of Fake Identity Usage
Currently, scope of Li Ao's use of fake identity including, but not limited to, the following:
- -- to ensure the excessive control of state power will not affect the privacy of his online privacy;
- -- to ensure his online activity will not contribute to any unethical commercial or research purposes;
- -- to ensure his fundamental human rights of privacy is not violated under course of unnecessary information use, and
- -- to promote ethical use of fake identity under situations where such use is necessary and important.
Under critical situations where the severity creates grounds of reasonable use of fake identity and such use of fake identity will significantly degrade the severity, Li Ao may eliminate such use for a certain period of time. Upon the severity has degraded to a certain degree where maintaining such use is no longer necessary, continued use must be terminated unless another reasonable use lingers.
Methods of Fake Identity Use
Method of Fake Identity Use | Explaniation | Reference Code |
---|---|---|
Announce or produce fake identities including name, nationality, sex, date of birth, Chinese National Identity Card number, Chinese mobile phone number, and other personal particulars Chinese state authorities may heavily use to identity a singular person, on any IT systems including online services operated on the Internet where Chinese state authorities may control access, or to any Chinese state authorities including state-owned mobile service operators and governmental service acceptance agencies | To ensure privacy to be honoured and protected, no unethical data sharing to online platforms, no impersonations will be produced, and to ensure no contributions to any unethical business researches and/or studies | PF/G [Presentation of Fake Identity, General Purposes] |
Announce or produce fake identities to healthcare entities operated in China | To ensure no private data will be accessed by any third parties; to ensure no contributions to unethical academic researches and/or studies | PF/A [Presentation of Fake Identity, Academical Purposes] |
Announce or produce fake mobile phone numbers where considered appropriate | To ensure no contributions to any unethical business or academical researches and/or studies; to ensure access to services restricted to Chinese phone number owners be accessible in an equally manner; to ensure no privacy information leakage | PFCM [Presentation of Fake Chinese Mobile Numbers] |
Announce or produce fabricated materials specific to Chinese mobile phone numbers to address human rights violations | To ensure the fundamental human rights be honoured or respected; such usage doesn't include to providing fabricated materials to address issues of Chinese mobile phone services | PMM [Presentation of Fabricated Materials with Respect to Chinese Mobile Numbers] |
Announce or produce fabricated materials of other kinds | To ensure fundamental human rights be honoured or respected | PMHR |
Use Internet connection from residential broadband from VPN/proxy | To ensure privacy be preserved and honoured; to ensure no contributions to unethical business/academical researches and/or studies | PFIC [Presentation of Fake Internet Connection] |
Use programmed IMEI number on GSM networks | To ensure privacy be preserved and honoured; to ensure no contributions to unethical business/academical researches and/or studies | PFDS [Presentation of Fake Device Serial Number] |
Current Use of Fake Identity
Use of Fake Identity | Reference Code | Remarks |
---|---|---|
As Tencent service customer | PF/G, PFCM, PFIC | Such use spans across different products including QQ, WeChat, and WeCom, etc. |
As Citic Bank customer | PMM | Such use includes issuance of fabricated statements of personal activity |
As China Unicom customer | PF/G, PFDS | Such use covers announcements of phone service usages and uses of different fake IMEIs to disguise as phone holder of different models |
Planned Use of Fake Identity
Planned Use of Fake Identity | Reference Code | Remarks |
---|---|---|
As China Unicom customer | PF/G | Planned use includes producing fake identity documents in the process of purchasing SIM cards and registering mobile service user information |
As Bank of China customer | PMHR | Planned use includes producing fake residential address documents to ensure banking services be accessible, circumventing excessive strict regulatory rules of the People's Bank of China and the Chinese government; such use does not include opening of accounts for money laundering, and other prohibited financial transactions where applicable laws applies |
History of Used Fake Identity
Usage of Fake Identity | Refrence Code | Remarks |
---|---|---|
Producing fake documents for circumventing international remittance blockage of Chinese government, to Bank of China | PMHR | Fabricated documents presented to Bank of China as supplementary documents attesting foreign exchange usage. Because of excessive power of the current Chinese governance the government either expressed or implied bank institutions must keep details of detailed documents showing funds usage for every international emmitance.
Fake documents provided to bank on 31/5/2024. |