IDOE FakeIdentity Intro: Difference between revisions

From LI AO's Wiki (Miraheze)
[checked revision][checked revision]
Content added Content deleted
(Make changes on page source to adjust paragraph indentation)
(Make changes on page source to adjust paragraph indentation)
Line 9: Line 9:
Currently, scope of Li Ao's use of fake identity including, but not limited to, the following:
Currently, scope of Li Ao's use of fake identity including, but not limited to, the following:


!-- to ensure the excessive control of state power will not affect the privacy of his online privacy;
:-- to ensure the excessive control of state power will not affect the privacy of his online privacy;
!-- to ensure his online activity will not contribute to any unethical commercial or research purposes;
:-- to ensure his online activity will not contribute to any unethical commercial or research purposes;
!-- to ensure his fundamental human rights of privacy is not violated under course of unnecessary information use, and
:-- to ensure his fundamental human rights of privacy is not violated under course of unnecessary information use, and
!-- to promote ethical use of fake identity under situations where such use is necessary and important.
:-- to promote ethical use of fake identity under situations where such use is necessary and important.


Under critical situations where the severity creates grounds of reasonable use of fake identity and such use of fake identity will significantly degrade the severity, Li Ao may eliminate such use for a certain period of time. Upon the severity has degraded to a certain degree where maintaining such use is no longer necessary, continued use must be terminated unless another reasonable use lingers.
Under critical situations where the severity creates grounds of reasonable use of fake identity and such use of fake identity will significantly degrade the severity, Li Ao may eliminate such use for a certain period of time. Upon the severity has degraded to a certain degree where maintaining such use is no longer necessary, continued use must be terminated unless another reasonable use lingers.

Revision as of 23:23, 14 April 2024


Background of Using Fake Identity

Debates on the usage of fake identities in various fields form to become a common topic of the modern society. Starting from late 2021, Li Ao has leveraged the use of fake identities to satisfy the needs of online protection. Upholding the ethics principles lays down to be Li Ao's core principles, and he acknowledges that such use of fake identities together with information technology tools to maintain certain degree of anonymous should be regulated to ensure common interests are not compromised because of his such exercises.

Under certain circumstances when the use of fake identity no longer remains to be the only way Li Ao can choose to protect his interests against identity attacks such as impersonation, unconditional access of privacy-related information and other kinds of cyber crimes, Li Ao will actively implement the use of other measures to satisfy such the needs.

Scope of Fake Identity Usage

Currently, scope of Li Ao's use of fake identity including, but not limited to, the following:

-- to ensure the excessive control of state power will not affect the privacy of his online privacy;
-- to ensure his online activity will not contribute to any unethical commercial or research purposes;
-- to ensure his fundamental human rights of privacy is not violated under course of unnecessary information use, and
-- to promote ethical use of fake identity under situations where such use is necessary and important.

Under critical situations where the severity creates grounds of reasonable use of fake identity and such use of fake identity will significantly degrade the severity, Li Ao may eliminate such use for a certain period of time. Upon the severity has degraded to a certain degree where maintaining such use is no longer necessary, continued use must be terminated unless another reasonable use lingers.

Methods of Fake Identity Use

Method of Fake Identity Use Explaniation Reference Code
Announce or produce fake identities including name, nationality, sex, date of birth, Chinese National Identity Card number, Chinese mobile phone number, and other personal particulars Chinese state authorities may heavily use to identity a singular person, on any IT systems including online services operated on the Internet where Chinese state authorities may control access, or to any Chinese state authorities including state-owned mobile service operators and governmental service acceptance agencies To ensure privacy to be honoured and protected, no unethical data sharing to online platforms, no impersonations will be produced, and to ensure no contributions to any unethical business researches and/or studdies PF/G [Presentation of Fake Identity, General Purposes]
Announce or produce fake identities to healthcare entities operated in China To ensure no private data will be accessed by any third parties; to ensure no contributions to unethical academic researches and/or studies PF/A [Presentation of Fake Identity, Academical Purposes]
Announce or produce fake mobile phone numbers where considered appropriate To ensure no contributions to any unethical business or academical researches and/or studies; to ensure access to services restricted to Chinese phone number owners be accessible in an equally manner; to ensure no privacy information leakage PFCM [Presentation of Fake Chinese Mobile Numbers]
Announce or produce fabricated materials specific to Chinese mobile phone numbers to address human rights violations To ensure the fundamental human rights be honoured or respected; such usage doesn't include to providing fabricated materials to address issues of Chinese mobile phone services PMM [Presentation of Fabricated Materials with Respect to Chinese Mobile Numbers]
Announce or produce fabricated materials of other kinds To ensure fundamental human rights be honoured or respected PMHR

Current Use of Fake Identity

Use of Fake Identity Reference Code Remarks
As Tencent service customer PF/G, PFCM Such use spans across different products including QQ, WeChat, and WeCom, etc.
As Citic Bank customer PMM Such use includes issuance of fabricated statements of personal activity
As China Unicom customer PF/G Such use covers announcements of phone service usages

Planned Use of Fake Identity

Planned Use of Fake Identity Reference Code Remarks
As China Unicom customer PF/G Planned use includes producing fake identity documents in the process of purchasing SIM cards and registering mobile service user information
As Bank of China customer PMHR Planned use includes producing fake residential address documents to ensure banking services be accessible, circumventing excessive strict regulatory rules of the People's Bank of China and the Chinese government; such use does not include opening of accounts for money laundering, and other prohibited financial transactions where applicable laws applies