Old Miraheze Wiki Pages:IDOE FakeIdentity Intro
Background of Using Fake Identity
Debates on the usage of fake identities in various fields form to become a common topic of the modern society. Starting from late 2021, Li Ao has leveraged the use of fake identities to satisfy the needs of online protection. Upholding the ethics principles lays down to be Li Ao's core principles, and he acknowledges that such use of fake identities together with information technology tools to maintain certain degree of anonymous should be regulated to ensure common interests are not compromised because of his such exercises.
This phrase of IDOE article also covers the use of fake electronic device identities, including fake IMEI of mobile devices and proxy/VPN IP addresses for disguising. IP addresses from reputable proxy/VPN providers aren't included.
Under certain circumstances when the use of fake identity no longer remains to be the only way Li Ao can choose to protect his interests against identity attacks such as impersonation, unconditional access of privacy-related information and other kinds of cyber crimes, Li Ao will actively implement the use of other measures to satisfy such the needs.
Scope of Fake Identity Usage
Currently, scope of Li Ao's use of fake identity including, but not limited to, the following:
- -- to ensure the excessive control of state power will not affect the privacy of his online privacy;
- -- to ensure his online activity will not contribute to any unethical commercial or research purposes;
- -- to ensure his fundamental human rights of privacy is not violated under course of unnecessary information use, and
- -- to promote ethical use of fake identity under situations where such use is necessary and important.
Under critical situations where the severity creates grounds of reasonable use of fake identity and such use of fake identity will significantly degrade the severity, Li Ao may eliminate such use for a certain period of time. Upon the severity has degraded to a certain degree where maintaining such use is no longer necessary, continued use must be terminated unless another reasonable use lingers.
Methods of Fake Identity Use
Method of Fake Identity Use | Explaniation | Reference Code |
---|---|---|
Announce or produce fake identities including name, nationality, sex, date of birth, Chinese National Identity Card number, Chinese mobile phone number, and other personal particulars Chinese state authorities may heavily use to identity a singular person, on any IT systems including online services operated on the Internet where Chinese state authorities may control access, or to any Chinese state authorities including state-owned mobile service operators and governmental service acceptance agencies | To ensure privacy to be honoured and protected, no unethical data sharing to online platforms, no impersonations will be produced, and to ensure no contributions to any unethical business researches and/or studies | PF/G [Presentation of Fake Identity, General Purposes] |
Announce or produce fake identities to healthcare entities operated in China | To ensure no private data will be accessed by any third parties; to ensure no contributions to unethical academic researches and/or studies | PF/A [Presentation of Fake Identity, Academical Purposes] |
Announce or produce fake mobile phone numbers where considered appropriate | To ensure no contributions to any unethical business or academical researches and/or studies; to ensure access to services restricted to Chinese phone number owners be accessible in an equally manner; to ensure no privacy information leakage | PFCM [Presentation of Fake Chinese Mobile Numbers] |
Announce or produce fabricated materials specific to Chinese mobile phone numbers to address human rights violations | To ensure the fundamental human rights be honoured or respected; such usage doesn't include to providing fabricated materials to address issues of Chinese mobile phone services | PMM [Presentation of Fabricated Materials with Respect to Chinese Mobile Numbers] |
Announce or produce fabricated materials of other kinds | To ensure fundamental human rights be honoured or respected | PMHR |
Use Internet connection from residential broadband from VPN/proxy | To ensure privacy be preserved and honoured; to ensure no contributions to unethical business/academical researches and/or studies | PFIC [Presentation of Fake Internet Connection] |
Use programmed IMEI number on GSM networks | To ensure privacy be preserved and honoured; to ensure no contributions to unethical business/academical researches and/or studies | PFDS [Presentation of Fake Device Serial Number] |
Current Use of Fake Identity
Use of Fake Identity | Reference Code | Remarks |
---|---|---|
As Tencent service customer | PF/G, PFCM, PFIC | Such use spans across different products including QQ, WeChat, and WeCom, etc. |
As Citic Bank customer | PMM | Such use includes issuance of fabricated statements of personal activity |
As China Unicom customer | PF/G, PFDS | Such use covers announcements of phone service usages and uses of different fake IMEIs to disguise as phone holder of different models |
Planned Use of Fake Identity
Planned Use of Fake Identity | Reference Code | Remarks |
---|---|---|
As China Unicom customer | PF/G | Planned use includes producing fake identity documents in the process of purchasing SIM cards and registering mobile service user information |
As Bank of China customer | PMHR | Planned use includes producing fake residential address documents to ensure banking services be accessible, circumventing excessive strict regulatory rules of the People's Bank of China and the Chinese government; such use does not include opening of accounts for money laundering, and other prohibited financial transactions where applicable laws applies |