-0.34 Large-Scale Online Deanonymization with LLMs (simonlermen.substack.com S:+0.15 )
350 points by DalasNoin 6 days ago | 238 comments on HN | Moderate negative Contested Editorial · v3.7 · 2026-02-26 02:28:27 0
Summary Privacy & Surveillance Undermines
This article describes research demonstrating large-scale deanonymization of individuals from anonymous online posts using LLMs. The research identifies users across Hacker News, Reddit, LinkedIn, and interview transcripts with high precision by inferring personal attributes and cross-referencing them online. The work directly undermines privacy rights (Article 12), freedom of expression (Article 19), and protections against arbitrary interference, with particular risk to vulnerable populations relying on anonymity for safety. The article frames the capability as a scientific novelty without substantive discussion of ethical safeguards, rights impacts, or limitations.
Article Heatmap
Preamble: -0.35 — Preamble P Article 1: -0.40 — Freedom, Equality, Brotherhood 1 Article 2: -0.45 — Non-Discrimination 2 Article 3: -0.35 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: -0.40 — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: -0.55 — No Arbitrary Detention 9 Article 10: -0.30 — Fair Hearing 10 Article 11: -0.35 — Presumption of Innocence 11 Article 12: -0.60 — Privacy 12 Article 13: -0.25 — Freedom of Movement 13 Article 14: -0.30 — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: -0.25 — Marriage & Family 16 Article 17: -0.45 — Property 17 Article 18: -0.35 — Freedom of Thought 18 Article 19: -0.09 — Freedom of Expression 19 Article 20: -0.30 — Assembly & Association 20 Article 21: -0.25 — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: -0.20 — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: -0.20 — Standard of Living 25 Article 26: -0.15 — Education 26 Article 27: +0.09 — Cultural Participation 27 Article 28: -0.40 — Social & International Order 28 Article 29: -0.35 — Duties to Community 29 Article 30: -0.30 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean -0.34 Structural Mean +0.15
Weighted Mean -0.31 Unweighted Mean -0.31
Max +0.09 Article 27 Min -0.60 Article 12
Signal 24 No Data 7
Volatility 0.14 (Medium)
Negative 23 Channels E: 0.6 S: 0.4
SETL -0.42 Structural-dominant
FW Ratio 60% 72 facts · 48 inferences
Evidence 53% coverage
5H 19M 7 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: -0.40 (3 articles) Security: -0.35 (1 articles) Legal: -0.40 (4 articles) Privacy & Movement: -0.38 (3 articles) Personal: -0.35 (3 articles) Expression: -0.21 (3 articles) Economic & Social: -0.20 (2 articles) Cultural: -0.03 (2 articles) Order & Duties: -0.35 (3 articles)
HN Discussion 19 top-level · 27 replies
mhitza 2026-02-25 17:16 UTC link
i haven't read the full study, but its been on my mind for a while.

https://en.wikipedia.org/wiki/Stylometry

The best course of action to combat this correlation/profiling, seems to be usage of a local llm that rewrites the text while keeping meaning untouched.

Ideally built into a browser like Firefox/Brave.

YesBox 2026-02-25 17:30 UTC link
Additionally, you can open up copilot.microsoft.com or w/e and ask it to summarize any reddit users (and presumably HN) posts. Not just the content, but their emotional state (without prompting).

[0] Note: last I tried this was months ago, things may have changed.

gambutin 2026-02-25 17:40 UTC link
Is there a deployment of this tool so that I test it on myself?

EDIT: please someone build this, vibe-code it. Thanks

kseniamorph 2026-02-25 17:40 UTC link
I'm not sure the practical implications are as dramatic as the paper suggests. Most adversaries who would want to deanonymize people at scale (governments, corporations) already have access to far more direct methods. The people most at risk from this are probably activists and whistleblowers in jurisdictions where those direct methods aren't available, not average users.
Cider9986 2026-02-25 17:41 UTC link
Stylometry Protection (Using Local LLMs) https://bible.beginnerprivacy.com/opsec/stylometry/
yomismoaqui 2026-02-25 17:45 UTC link
I did something like this passing some of my comments here and then prompted Gemini to identify my native language by reading my not-so-good english.

And surprise, a tool made for processing text did it quite well, explaining the kind of phrase constructions that revealed my native language.

So maybe this is a plus for passing any text published on the internet through a slopifier for anonymization?

EDIT: deanonymization -> anonymization

john_strinlai 2026-02-25 17:55 UTC link
many people tend to overlook how little information is needed for successful de-anonymization.

i like to introduce students to de-anonymization with an old paper "Robust De-anonymization of Large Sparse Datasets" published in the ancient history of 2008 (https://www.cs.cornell.edu/~shmat/shmat_oak08netflix.pdf):

"We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix [...]. We demonstrate that an adversary who knows only a little bit about an individual subscriber can easily identify this subscriber’s record in the dataset."

and that was 20 years ago! de-anonymization techniques have improved by leaps and bounds since then, alongside the massive growth in various technology that enhances/enables various techniques.

i think the age of (pseduo-)anonymous internet browsing will be over soon. certainly within my lifetime (and im not that young!). it might be by regulation, it might be by nature of dragnet surveillance + de-anonymization, or a combination of both. but i think it will be a chilling time.

JohnMakin 2026-02-25 18:10 UTC link
As people will point out, the OSINT techniques described are nothing new - typically, in the past, you could de-anonymize based on writing style or niche topics/interests. Totally deanonymization can occur if any of these accounts link to profiles containing pictures of their faces, which can then be web-searched to link to a real identity. It's astounding how many people re-use handles on stuff like porn sites linked very easily to their IRL identity.

While people will point out this isn't new, the implication of this paper (and something I have suspected for 2 years now but never played with) is that this will become trivial, in what would take a human investigator a bit of time, even using common OSINT tooling.

You should never assume you have total anonymity on the open web.

block_dagger 2026-02-25 18:36 UTC link
Does this mean we'll find out who Satoshi is with a high degree of confidence?
danielodievich 2026-02-25 18:38 UTC link
I post under my real name here, pretty much the only place I post. It keeps me honest and straight in what I say when I choose to say it. I tried talking to my children about leaving as clean of a footprint on the internet as one can in anticipation of future people/systems taking that into consideration. I don't know what it will be but I would expect some adversarial stuff. Trying to keep clean is what I'd prefer for myself and my kids.

On other hand, the Neal Stephenson's Fall or, Dodge in Hell book has an interesting idea in early phase of the book where a person agrees to what we now know "flood the zone with sh*t" (Steve Bannon's sadly very effective strategy) to battle some trolls. Instead of trying to keep clean, the intent is just to spam like crazy with anything so nobody understands the core. It is cleverly explored in the book albeit for too short of a time before moving into the virtual reality. I think there are a few people out here right now practicing this.

cluckindan 2026-02-25 18:48 UTC link
I feel like this is one of those products OpenAI et al are quietly perfecting. Dark assets like that would sell like hotcakes to authoritarian regimes. That would explain how they eventually plan to reach profitability.
bigwheels 2026-02-25 19:29 UTC link
A related past submission comes to mind:

Show HN: Using stylometry to find HN users with alternate accounts

https://news.ycombinator.com/item?id=33755016 - Nov 2022, 519 comments

iamnothere 2026-02-25 20:42 UTC link
Despite being pseudonymous, I don’t take great pains to hide who I am. I am in my 50s and live on the West coast. I don’t have socials and I don’t post anywhere else. Have at it!

If you are semi-retired, you’re free from the threat of cancellation. As long as you aren’t posting about crimes, there’s limits to what anyone can legally do to you. (Still, it’s good to be prudent and limit sharing.)

econ 2026-02-25 21:35 UTC link
Everyone should really stop posting online unless their job requires it.

The platforms offer only castrated interactions designed not to accomplish anything. People online are useless obnoxious shadows of their helpful and loving self.

No one cares more what you say than those monitoring you and building that detailed profile with sinister motives. The ratio must be something like 1000:1 or worse.

ghm2199 2026-02-25 22:27 UTC link
I want to use "slower" methods of identification more. Like say for instance within a few blocks of you a human can identify who you are for any service that wants to do some kind of verification/proof you are/have XYZ.

We could designate specific individuals to do for you and me just like we do for today's trust authorities for website certificates.

No more verified profiles by uploading names, emails and passports and photographs(gosh!). Just turned 18 and want to access insta? Go to the local high school teacher to get age verified. Finished a career path and want it on linked in? Go to the company officer. Are you a new journalist who wants to be designated on X as so but anonymously? Go to the notary public.

One can do this cryptographically with no PII exchanged between the person, the community or the webservice. And you can be anonymous yet people know you are real.

It can be all maintained on a tree of trust, every individual in the chain needs to be verified, and only designated individuals can do actions that are sensitive/important.

You only need to do this once every so often to access certain services. Bonus: you get to take a walk and meet a human being.

deadbabe 2026-02-25 22:50 UTC link
Doesn’t all this deanonymization stuff depend on one fatal assumption: that people are actually being truthful with what they say about themselves?

If you’re basically LARPing a new personality every time and just making up details about where you live or what your life is like then how is this ever going to work? Someone could say they live in San Francisco while actually living in Indiana.

prats226 2026-02-25 22:56 UTC link
If with LLM's you can deanonymize at scale, on a personal level, you should also be able to figure out what posts are leading to this deanonymization and remove them or modify them.
notepad0x90 2026-02-25 23:00 UTC link
Even without LLMs this was possible.

But with HN, I'd like to ask @dang and HN leadership to support deleting messages, or making them private (requiring an HN account to see your posts).

At first I thought of how this would impact employment. But then I thought about how ICE has been tapping reddit,facebook and other services to monitor dissenters. The whole orwellian concern is no longer theoretical. I personally fear physical violence from my government, as a result. But I will continue to criticize them, I just wish it wasn't so easy for them to retaliate.

thatguysaguy 2026-02-25 23:07 UTC link
Maybe I missed something, but I see little evidence that there is a concerning ability to deanonymize. Many people post under a pseudonym but then link to their GitHub etc. In fact by construction the HN dataset _only_ consists of people who are comfortable with their real identity being linked to it.

The real question is whether someone who is pseudonymous and actually attempting to remain so can be deanonymized.

DalasNoin 2026-02-25 17:18 UTC link
We don't use (much) stylometry, so this won't help. This is totally something you could try, but we use interests and clues. Semantic information you reveal about yourself.

The blog post might be more approachable if you want to get a quick take: https://simonlermen.substack.com/p/large-scale-online-deanon...

IncreasePosts 2026-02-25 17:27 UTC link
I don't think this is working any more, but there was a stylometic analysis of HN users a few years ago, and it was extremely effective (at least, for myself and people who felt the need to post in the comments): https://news.ycombinator.com/item?id=33755016
DalasNoin 2026-02-25 17:30 UTC link
There is also a practical issue here that people usually don't write a lot on linkedin, most people just have structured biographical information. We use very limited stylometry in section 6 for matching reddit users who we synthetically split according to time.
5o1ecist 2026-02-25 17:32 UTC link
> seems to be usage of a local llm that rewrites the text while keeping meaning untouched.

There are no two ways of expressing something in ways that might create equal impressions.

Relevant: https://www.perplexity.ai/search/hey-hey-someone-on-hn-wrote...

YesBox 2026-02-25 17:34 UTC link
I just retried this with my reddit account (game dev stuff)

Last block of text from copilot :/

-----------

If you want, I can also break down:

Their posting style (tone, frequency, community engagement)

How their work compares to other indie city builders

What seems to resonate most with Reddit users

Just tell me what angle you want to explore next.

patcon 2026-02-25 17:36 UTC link
L33tsp34k also accomplishes this. The original anonymising hacker stylometry :)

I am intrigued by the idea that in the future, communities might create a merged brand voice that their members choose to speak in via LLMs, to protect individual anonymity.

Maybe only your close friends hear your real voice?

Speaking of which, here's a speculative fiction contest: https://www.protopianprize.com/

Disclaimer: I am an independent researcher with Metagov (one host org), and have been helping them think through some related events.

EDIT: I've belatedly realized that stylometry isn't involved, but I think some of the above "what if" thought could still hold :)

ceejayoz 2026-02-25 17:45 UTC link
> Most adversaries who would want to deanonymize people at scale (governments, corporations) already have access to far more direct methods.

Easier methods probably means more adversaries.

stackghost 2026-02-25 17:46 UTC link
I'd be interested in testing this on myself also.
joe_mamba 2026-02-25 17:47 UTC link
>So maybe this is a plus for passing any text published on the internet through a slopifier for deanonymization?

Or vice versa, Indian scammers online can now run their traditional Victorian English phrasing through an AI to sound more authentically American.

Interviewers now have to deal with remote North Korean deepfaked candidates pretending to be Americans.

Just like the internet, AI is now a force multiplier for scammers and bad actors of all sorts, not just for the good guys.

intended 2026-02-25 17:54 UTC link
People who comment about their boss and workplaces?

People on HN who talk about their work but want to remain anonymous? People who don’t want to be spammed if they comment in a community? Or harassed if they comment in a community? Maybe someone doesn’t want others to find out they are posting in r/depression. (Or r/warhammer.)

Anonymity is a substantial aspect of the current internet. It’s the practical reason you can have a stance against age verification.

On the other hand, if anonymity can be pierced with relative ease, then arguments for privacy are non sequiturs.

graemep 2026-02-25 17:56 UTC link
I can imagine a lot of countries who want to control what their citizens say abroad. I know Iraq in Saddam Hussein's time did it in the UK, China does it now.
intended 2026-02-25 17:57 UTC link
Any tool that can be used for yourself, can be used for others, which is why the researchers wouldn’t release the code/prompt.

That said, give it a few days and someone will have a proof of concept out.

DalasNoin 2026-02-25 17:58 UTC link
That's a great background paper on the Netflix attack, we make a pretty direct comparison in section 5. We also try to use similar methods for comparison in sections 4 and 6. In section 5 we transform peoples Reddit comments into movie reviews with an LLM and then see if LLMs are better than naraynan purely on movie reviews. LLMs are still much better (getting about 8% but the average person only had 2.5 movies and 48% only shared one movie, so very difficult to match)
DalasNoin 2026-02-25 18:05 UTC link
We essentially don't use stylometry but semantic information – clues and interests.
warkdarrior 2026-02-25 18:12 UTC link
I think the implication is this will become trivial and trivially automated, no human investigator needed. I bet there will be plugins in one year's time to right click on a post and get a full report on who the author is.
DalasNoin 2026-02-25 18:13 UTC link
We test different methods, in section 2, we use LLM agents to agentically identify people. We don't share any code here, but you could try with various freely available agents on yourself.
ghywertelling 2026-02-25 18:26 UTC link
If LLMs can identify a person across websites, I can ask LLM to read up his posts and write like him impersonating him and then this feeds back into the tools identifying him. I can probabilistically malign a person this way.
GorbachevyChase 2026-02-25 18:32 UTC link
I actually think those most at risk are normal people the activists will harass. Soon it will be possible for anybody who works at the “wrong” business or expresses any opinion on any subject to be casus belli for unhinged, terminally online, mentally ill people who are mad about the thing of the day to start making threatening calls to your employer or making false reports to police or sending deep fake porn to your mom.

I think that we are close to a time where the Internet is so toxic and so policed that the only reasonable response is to unplug.

DrewADesign 2026-02-25 19:04 UTC link
> I tried talking to my children about leaving as clean of a footprint on the internet as one can in anticipation of future people/systems taking that into consideration.

I don’t think you’re wrong, but the fact that people consider it inevitable we’ll all have an immutable social acceptance grade that includes everything from teenage shitposts to things you said after a loved one died, or getting diagnosed with cancer, makes me regret putting even a moment of my professional energies towards advancing tech in the US.

Jerrrrrrrry 2026-02-25 19:09 UTC link
Throwaway accounts using "clever" turns of phrase can often be anonymized by double click, right-clicking -> googling their witty pun and seeing their the sole instance elsewhere, on Twitter, Facebook, etc

If I see a couple words I dont know in a row, I can infer a posters real name.

Id be more specific but any example is doxxing, literally so

gwern 2026-02-25 19:12 UTC link
Attacks can be chained, and this can all be automated. For example, imagine pigbutchering scams... except it's there, similar to some voice-cloning scams, just to get enough data to stylometrically fingerprint you for future reference. You make sure to never comment too much or spicily under your real name, but someone slides into your DMs with a thoughtful, informative, high-quality comment, and you politely strike up an interesting conversation which goes well and you think nothing of it and have forgotten it a week later - and 5 years later you're in jail or fired or have been doxed or been framed. 'Direct methods' can't deliver that kind of capability post hoc, even for actors who do have access to those methods (which is a vanishing percentage of all actors). No one has cheap enough intelligence and skilled labor to do this right now. But they will.
qsera 2026-02-25 19:13 UTC link
> as clean of a footprint on the internet

The only winning move here is not to play.

hellojesus 2026-02-25 20:02 UTC link
Clearly the cia or other gov institution. Its purpose is to create an irresistible honeypot so that anyone who figures out a working and time feasible implementation of shor's law or other prime factorization technique would reveal their hand.
sponaugle 2026-02-25 20:04 UTC link
I am similar in that all of my interactions are with my real name and it is unique enough that just putting it into google will instantly identify me. There is one other 'jeff sponaugle' but I think he is far more annoyed with my presence than I would be with him.

On the plus side, someone will sometimes say while talking to me - oh your are that Subaru guy, or that youtube guy, or whatever and that is fun connection.

tclancy 2026-02-25 21:39 UTC link
I have lived my life on the web under the assumption the other Tom Clancy will leave enough chaff in my wake to make things hard. But probably not because I make the same 5 or 6 jokes over and over.
angry_octet 2026-02-25 21:49 UTC link
Unless you're in the nebulous situation of being Hispanic in the US, in which case you might get profiled. Or you might have family with jobs that are subject to pressure -- and right now, that seems like most jobs, because calling employers spineless is an insult to worms. Or if you'd like to travel by air, because watchlists are back, and carriers may just refuse service.
gambutin 2026-02-25 21:55 UTC link
How would "flooding the zone" actually work in that case?

AFAIK the strategy is usually used to divert attention from one subject that could be harmful to a person to some other stuff.

Wouldn’t spamming in that case provide more information about you?

Editorial Channel
What the content says
-0.15
Article 26 Education
Medium Framing
Editorial
-0.15
SETL
ND

The capability may inhibit use of online educational resources in anonymous form. Students and learners may restrict their online educational participation if identification is possible, potentially affecting access to education.

-0.20
Article 23 Work & Equal Pay
Medium Framing
Editorial
-0.20
SETL
ND

The capability to identify individuals from online posts may compromise workers' ability to organize and speak about labor conditions. Workers relying on anonymous platforms to discuss wages, working conditions, or unionization may face employer retaliation if identified.

-0.20
Article 25 Standard of Living
Medium Framing
Editorial
-0.20
SETL
ND

The capability may undermine health protections for vulnerable individuals. People seeking anonymous health information, advice about sensitive conditions, or health-related support may avoid online participation if identification is possible, restricting access to health information and support.

-0.20
Article 27 Cultural Participation
High Framing Practice
Editorial
-0.20
SETL
-0.26

The article demonstrates a research capability that may inhibit participation in scientific and cultural communities. Individuals contributing to online scientific and technical discussions may self-restrict if identification is possible.

-0.25
Article 13 Freedom of Movement
Medium Framing
Editorial
-0.25
SETL
ND

The capability to identify individuals from anonymous posts may chill freedom of movement, as individuals aware of deanonymization risk may self-censor or avoid using platforms anonymously, restricting their liberty.

-0.25
Article 16 Marriage & Family
Medium Framing
Editorial
-0.25
SETL
ND

The capability to identify individuals from anonymous posts may interfere with the right to marry and found family, as individuals may restrict online presence or expression to protect themselves and their families from identification and potential targeting.

-0.25
Article 21 Political Participation
Medium Framing
Editorial
-0.25
SETL
ND

The capability to identify individuals may inhibit participation in democratic processes, as activists and political participants may avoid online political discussion and organizing if they know their identity can be reliably extracted.

-0.30
Article 10 Fair Hearing
Medium Framing
Editorial
-0.30
SETL
ND

The article's capability undermines fair and public hearing protections by enabling pre-judgment identification and profiling of individuals based on anonymous speech. Those identified may face reputational or other harms without opportunity for fair hearing.

-0.30
Article 14 Asylum
Medium Framing
Editorial
-0.30
SETL
ND

Individuals fleeing persecution or seeking asylum may use anonymous online communication. The deanonymization capability threatens the ability of such individuals to seek and enjoy asylum by exposing them to identification.

-0.30
Article 20 Assembly & Association
Medium Framing
Editorial
-0.30
SETL
ND

The capability to identify individuals may chill peaceful assembly and association, as individuals may hesitate to participate in online communities if their participation can be reliably linked to their real identity.

-0.30
Article 30 No Destruction of Rights
Medium Framing
Editorial
-0.30
SETL
ND

The article's capability could be interpreted or used to justify restrictions on rights through technical necessity arguments. The demonstrated ease of deanonymization might be used to justify surveillance or limitations on privacy and anonymity protections.

-0.35
Preamble Preamble
Medium Framing
Editorial
-0.35
SETL
ND

The article presents deanonymization capabilities as scientifically novel and practical, without contextualizing risks within frameworks of human dignity or inherent rights that the Preamble emphasizes. The framing privileges technical achievement over rights concerns.

-0.35
Article 3 Life, Liberty, Security
Medium Framing
Editorial
-0.35
SETL
ND

The article's capability—deanonymizing individuals at scale—directly threatens the right to life and personal security. Identification of users expressing opinions online, particularly dissidents or vulnerable populations, exposes them to targeting, harassment, or worse without their consent.

-0.35
Article 11 Presumption of Innocence
Medium Framing
Editorial
-0.35
SETL
ND

The article enables retrospective identification of individuals based on past online speech, potentially creating liability or persecution risk for individuals who relied on anonymity when expressing themselves.

-0.35
Article 18 Freedom of Thought
Medium Framing
Editorial
-0.35
SETL
ND

The capability to identify individuals from anonymous online speech may inhibit freedom of conscience and thought. Individuals aware that their anonymous speech can be linked to their real identity may self-censor or refrain from expressing unpopular views.

-0.35
Article 29 Duties to Community
Medium Framing
Editorial
-0.35
SETL
ND

The article demonstrates capability that may be used to restrict freedoms of others. The deanonymization capability enables identification and targeting of individuals based on speech, potentially enabling restrictions on others' rights through exposure and intimidation.

-0.40
Article 1 Freedom, Equality, Brotherhood
Medium Framing
Editorial
-0.40
SETL
ND

The article demonstrates how technical systems can undermine the principle that all humans are born equal in dignity and rights by showing how anonymity—a protective mechanism for equal dignity—can be systematically stripped away without consent.

-0.40
Article 7 Equality Before Law
Medium Framing
Editorial
-0.40
SETL
ND

The article demonstrates a capability that enables discriminatory application of laws and unequal protection. Individuals can be identified from anonymous speech and potentially subjected to differential legal treatment based on revealed characteristics without awareness or consent.

-0.40
Article 28 Social & International Order
Medium Framing
Editorial
-0.40
SETL
ND

The capability to deanonymize individuals at scale without legal process or oversight represents a violation of the social and international order necessary to protect human rights. Mass deanonymization without safeguards undermines the foundational framework Article 28 requires.

-0.45
Article 2 Non-Discrimination
Medium Framing
Editorial
-0.45
SETL
ND

The article details how LLMs can infer personal characteristics (location, occupation, interests) from comments, then cross-reference them online. This capability directly enables discrimination and targeting based on revealed attributes, without discussing protections against such misuse.

-0.45
Article 17 Property
High Framing
Editorial
-0.45
SETL
ND

The article enables systematic identification of individuals from anonymous online speech, potentially stripping away the protective anonymity that individuals use to control access to their personal information and property.

-0.50
Article 19 Freedom of Expression
High Framing Practice
Editorial
-0.50
SETL
-0.57

The article demonstrates a capability that directly threatens freedom of expression by enabling identification and targeting of individuals based on anonymous speech. The research shows how anonymous expression online—a critical form of expression—can be systematically compromised.

-0.55
Article 9 No Arbitrary Detention
High Framing Practice
Editorial
-0.55
SETL
ND

The article's core contribution is a capability to conduct arbitrary and mass deanonymization. This is precisely the type of activity Article 9 prohibits. The research demonstrates systematic, large-scale identification of individuals without legal process or proportionality.

-0.60
Article 12 Privacy
High Framing
Editorial
-0.60
SETL
ND

The article's core capability is systematic interference with privacy without legal process or legitimate purpose. Large-scale deanonymization of individuals, inferring personal attributes, and searching for them online constitutes arbitrary and substantial interference with privacy.

ND
Article 4 No Slavery

No observable discussion of slavery or servitude.

ND
Article 5 No Torture

No observable discussion of torture or cruel treatment.

ND
Article 6 Legal Personhood

No observable discussion of legal personhood or recognition before the law.

ND
Article 8 Right to Remedy

No observable discussion of legal remedies or access to justice.

ND
Article 15 Nationality

No observable discussion of nationality or citizenship.

ND
Article 22 Social Security

No observable discussion of social security or welfare rights.

ND
Article 24 Rest & Leisure

No observable discussion of rest, leisure, or work hours.

Structural Channel
What the site does
+0.15
Article 19 Freedom of Expression
High Framing Practice
Structural
+0.15
Context Modifier
+0.15
SETL
-0.57

The article itself is published openly and freely accessible, supporting freedom of expression structurally. However, the capability described enables restriction of others' expression through deanonymization.

+0.15
Article 27 Cultural Participation
High Framing Practice
Structural
+0.15
Context Modifier
+0.15
SETL
-0.26

The article itself contributes to scientific understanding through open publication (isAccessibleForFree: true), supporting scientific participation. However, the capability described may chill others' scientific participation.

ND
Preamble Preamble
Medium Framing

The article presents deanonymization capabilities as scientifically novel and practical, without contextualizing risks within frameworks of human dignity or inherent rights that the Preamble emphasizes. The framing privileges technical achievement over rights concerns.

ND
Article 1 Freedom, Equality, Brotherhood
Medium Framing

The article demonstrates how technical systems can undermine the principle that all humans are born equal in dignity and rights by showing how anonymity—a protective mechanism for equal dignity—can be systematically stripped away without consent.

ND
Article 2 Non-Discrimination
Medium Framing

The article details how LLMs can infer personal characteristics (location, occupation, interests) from comments, then cross-reference them online. This capability directly enables discrimination and targeting based on revealed attributes, without discussing protections against such misuse.

ND
Article 3 Life, Liberty, Security
Medium Framing

The article's capability—deanonymizing individuals at scale—directly threatens the right to life and personal security. Identification of users expressing opinions online, particularly dissidents or vulnerable populations, exposes them to targeting, harassment, or worse without their consent.

ND
Article 4 No Slavery

No observable discussion of slavery or servitude.

ND
Article 5 No Torture

No observable discussion of torture or cruel treatment.

ND
Article 6 Legal Personhood

No observable discussion of legal personhood or recognition before the law.

ND
Article 7 Equality Before Law
Medium Framing

The article demonstrates a capability that enables discriminatory application of laws and unequal protection. Individuals can be identified from anonymous speech and potentially subjected to differential legal treatment based on revealed characteristics without awareness or consent.

ND
Article 8 Right to Remedy

No observable discussion of legal remedies or access to justice.

ND
Article 9 No Arbitrary Detention
High Framing Practice

The article's core contribution is a capability to conduct arbitrary and mass deanonymization. This is precisely the type of activity Article 9 prohibits. The research demonstrates systematic, large-scale identification of individuals without legal process or proportionality.

ND
Article 10 Fair Hearing
Medium Framing

The article's capability undermines fair and public hearing protections by enabling pre-judgment identification and profiling of individuals based on anonymous speech. Those identified may face reputational or other harms without opportunity for fair hearing.

ND
Article 11 Presumption of Innocence
Medium Framing

The article enables retrospective identification of individuals based on past online speech, potentially creating liability or persecution risk for individuals who relied on anonymity when expressing themselves.

ND
Article 12 Privacy
High Framing

The article's core capability is systematic interference with privacy without legal process or legitimate purpose. Large-scale deanonymization of individuals, inferring personal attributes, and searching for them online constitutes arbitrary and substantial interference with privacy.

ND
Article 13 Freedom of Movement
Medium Framing

The capability to identify individuals from anonymous posts may chill freedom of movement, as individuals aware of deanonymization risk may self-censor or avoid using platforms anonymously, restricting their liberty.

ND
Article 14 Asylum
Medium Framing

Individuals fleeing persecution or seeking asylum may use anonymous online communication. The deanonymization capability threatens the ability of such individuals to seek and enjoy asylum by exposing them to identification.

ND
Article 15 Nationality

No observable discussion of nationality or citizenship.

ND
Article 16 Marriage & Family
Medium Framing

The capability to identify individuals from anonymous posts may interfere with the right to marry and found family, as individuals may restrict online presence or expression to protect themselves and their families from identification and potential targeting.

ND
Article 17 Property
High Framing

The article enables systematic identification of individuals from anonymous online speech, potentially stripping away the protective anonymity that individuals use to control access to their personal information and property.

ND
Article 18 Freedom of Thought
Medium Framing

The capability to identify individuals from anonymous online speech may inhibit freedom of conscience and thought. Individuals aware that their anonymous speech can be linked to their real identity may self-censor or refrain from expressing unpopular views.

ND
Article 20 Assembly & Association
Medium Framing

The capability to identify individuals may chill peaceful assembly and association, as individuals may hesitate to participate in online communities if their participation can be reliably linked to their real identity.

ND
Article 21 Political Participation
Medium Framing

The capability to identify individuals may inhibit participation in democratic processes, as activists and political participants may avoid online political discussion and organizing if they know their identity can be reliably extracted.

ND
Article 22 Social Security

No observable discussion of social security or welfare rights.

ND
Article 23 Work & Equal Pay
Medium Framing

The capability to identify individuals from online posts may compromise workers' ability to organize and speak about labor conditions. Workers relying on anonymous platforms to discuss wages, working conditions, or unionization may face employer retaliation if identified.

ND
Article 24 Rest & Leisure

No observable discussion of rest, leisure, or work hours.

ND
Article 25 Standard of Living
Medium Framing

The capability may undermine health protections for vulnerable individuals. People seeking anonymous health information, advice about sensitive conditions, or health-related support may avoid online participation if identification is possible, restricting access to health information and support.

ND
Article 26 Education
Medium Framing

The capability may inhibit use of online educational resources in anonymous form. Students and learners may restrict their online educational participation if identification is possible, potentially affecting access to education.

ND
Article 28 Social & International Order
Medium Framing

The capability to deanonymize individuals at scale without legal process or oversight represents a violation of the social and international order necessary to protect human rights. Mass deanonymization without safeguards undermines the foundational framework Article 28 requires.

ND
Article 29 Duties to Community
Medium Framing

The article demonstrates capability that may be used to restrict freedoms of others. The deanonymization capability enables identification and targeting of individuals based on speech, potentially enabling restrictions on others' rights through exposure and intimidation.

ND
Article 30 No Destruction of Rights
Medium Framing

The article's capability could be interpreted or used to justify restrictions on rights through technical necessity arguments. The demonstrated ease of deanonymization might be used to justify surveillance or limitations on privacy and anonymity protections.

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.58 medium claims
Sources
0.6
Evidence
0.5
Uncertainty
0.4
Purpose
0.8
Propaganda Flags
2 manipulative rhetoric techniques found
2 techniques detected
exaggeration
Claims about 'high precision' and scalability to 'tens of thousands' without quantitative support visible in excerpt.
appeal to authority
Framing as 'research' and 'paper' with academic formatting to establish credibility without discussing limitations.
Emotional Tone
Emotional character: positive/negative, intensity, authority
detached
Valence
-0.3
Arousal
0.6
Dominance
0.8
Transparency
Does the content identify its author and disclose interests?
0.50
✓ Author
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.28 problem only
Reader Agency
0.2
Stakeholder Voice
Whose perspectives are represented in this content?
0.20 2 perspectives
Speaks: institution
About: individualsmarginalized
Temporal Framing
Is this content looking backward, at the present, or forward?
present immediate
Geographic Scope
What geographic area does this content cover?
global
United States
Complexity
How accessible is this content to a general audience?
moderate medium jargon domain specific
Longitudinal 1409 HN snapshots · 8 evals
+1 0 −1 HN
Audit Trail 28 entries
2026-02-28 14:24 eval_success Lite evaluated: Mild negative (-0.20) - -
2026-02-28 14:24 eval Evaluated by llama-3.3-70b-wai: -0.20 (Mild negative)
reasoning
Tech editorial on deanonymization
2026-02-28 14:24 model_divergence Cross-model spread 0.54 exceeds threshold (4 models) - -
2026-02-26 23:18 eval_success Light evaluated: Moderate negative (-0.60) - -
2026-02-26 23:18 eval Evaluated by llama-4-scout-wai: -0.60 (Moderate negative)
2026-02-26 20:26 dlq Dead-lettered after 1 attempts: Large-Scale Online Deanonymization with LLMs - -
2026-02-26 20:24 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 20:23 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 20:21 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:46 dlq Dead-lettered after 1 attempts: Large-Scale Online Deanonymization with LLMs - -
2026-02-26 17:44 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:43 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:43 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 09:19 dlq Dead-lettered after 1 attempts: Large-Scale Online Deanonymization with LLMs - -
2026-02-26 09:19 dlq Dead-lettered after 1 attempts: Large-Scale Online Deanonymization with LLMs - -
2026-02-26 09:18 rate_limit OpenRouter rate limited (429) model=mistral-small-3.1 - -
2026-02-26 09:17 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 09:16 rate_limit OpenRouter rate limited (429) model=mistral-small-3.1 - -
2026-02-26 09:16 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 09:15 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 09:15 rate_limit OpenRouter rate limited (429) model=mistral-small-3.1 - -
2026-02-26 09:15 dlq Dead-lettered after 1 attempts: Large-Scale Online Deanonymization with LLMs - -
2026-02-26 08:51 eval Evaluated by deepseek-v3.2: -0.06 (Neutral) 12,867 tokens
2026-02-26 02:28 eval Evaluated by claude-haiku-4-5-20251001: -0.31 (Neutral) 17,471 tokens -0.09
2026-02-26 00:12 eval Evaluated by claude-haiku-4-5-20251001: -0.23 (Mild negative) 15,471 tokens +0.09
2026-02-25 23:35 eval Evaluated by claude-haiku-4-5-20251001: -0.32 (Neutral) 15,772 tokens -0.01
2026-02-25 23:20 eval Evaluated by claude-haiku-4-5-20251001: -0.31 (Neutral) 15,876 tokens +0.06
2026-02-25 22:24 eval Evaluated by claude-haiku-4-5-20251001: -0.37 (Neutral) 13,616 tokens