Jump to: navigation, search


Whonix does not obfuscate a user's writing style. Consequently, unless precautions are taken (see below), users are at risk from stylometric analysis based on their linguistic style. Research suggests only a few thousand words (or less) may be enough to positively identify an author, and there are a host of software tools available to conduct this analysis.

This technique is used by advanced adversaries to attribute authorship to anonymous documents, online texts (web pages, blogs etc.), electronic messages (emails, tweets, posts etc.) and more. The field is dominated by A.I. techniques like neural networks and statistical pattern recognition, and is critical to privacy and security. Current anonymity and circumvention systems are focused on location-based privacy, but ignore leakage of identification via the content of data which has a high accuracy in authorship recognition (90%+ probability). [1]

There are multiple ways to conduct statistical analysis on "anonymous" texts, including: [2] [3]

  • Keystroke fingerprinting, for example in conjunction with Javascript.
  • Stylistic flourishes.
  • Abbreviations.
  • Spelling preferences and misspellings.
  • Language preferences.
  • Word frequency.
  • Number of unique words.
  • Regional linguistic preferences in slang, idioms and so on.
  • Sentence/phrasing patterns.
  • Word co-location (pairs).
  • Use of formal/informal language.
  • Function words.
  • Vocabulary usage and lexical density.
  • Character count with whitespace.
  • Average sentence length.
  • Average syllables per word.
  • Synonym choice.
  • Expressive elements like colors, layout, fonts, graphics, emotions and so on.
  • Analysis of grammatical structure and syntax.

Fortunately, research suggests that if users purposefully obfuscate their linguistic style or imitate the style of other known authors, this is largely successful in defeating all stylometric analysis methods, so they are no better than randomly guessing the correct author of a document. However, using automated methods like machine translation services do not appear to be a viable method of circumvention. [4]

Mitigating the threat of stylometric analysis is further documented on this page: Surfing Posting Blogging.

See also:


  1. https://www.cs.drexel.edu/~sa499/papers/adversarial_stylometry.pdf
  2. https://en.wikipedia.org/wiki/Stylometry
  3. https://www.cs.drexel.edu/~sa499/papers/adversarial_stylometry.pdf
  4. https://www.cs.drexel.edu/~sa499/papers/adversarial_stylometry.pdf

Random News:

Are you proficient with iptables? Want to contribute? Check out possible improvements to iptables. Please come and introduce yourself in the development forum.

Impressum | Datenschutz | Haftungsausschluss

https | (forcing) onion
Share: Twitter | Facebook | Google+

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself.