التعديل باستخدام آي بي: تعزيز الخصوصية وتقليل حالات إساءة الاستخدام

This page is a translated version of the page IP Editing: Privacy Enhancement and Abuse Mitigation and the translation is 32% complete.

ما هو إخفاء عناوين الآي بي ولماذا تلجأ مؤسسة ويكيميديا لإخفاء هذه العناوين؟

ينتج عن إخفاء عناوين الآي بي إخفاء عناوين آي بي المحررين غير المسجلين على مشاريع ويكيميديا، سواء كان الإخفاء كاملًا أو جزئيًا، عن الجميع عدا من يحتاجون للوصول إليها لمكافحة النشر المزعج والتخريب والتحرش والتضليل.

يمكن لأي شخص في الوقت الراهن تعديل مواقع الويكي التابعة لويكيميديا دون الحاجة لوجود حساب ويكيميديا أو دون تسجيل الدخول. سوف تسجل برمجيات ميدياويكي، البرمجيات المستخدمة في تشغيل مشاريع ويكيميديا، عنوان الآي بي الذي تستخدمه وتنشره في سجلها العمومي. أي شخص يسعى لإيجاد عنوان الآي بي الذي تستخدمه سيتمكن من إيجاده.

لدى مشاريع ويكيميديا سببًا وجيهًا لتجزين عناوين الآي بي ونشرها: هذه العناوين تستخدم استخدامًا مهمًا في إبعاد المخربين والمتحرشين عن مواقعنا الويكي.

إلا أن عنوان الآي بي الذي تستخدمه قد يدل على المكان الذي تعدل منه ويمكن أن يستخدم في تحديد هويتك وجهازك. هذا الأمر يحمل خطرًا خاصًا لو كنت تعدل من منطقة تعتبر فيها مواقعنا الويكي مثيرة للقلاقل. يجوز أن يسمح نشر عنوان الآي بي الذي تستخدمه للآخرين تحديد موقعك.

بسبب التغييرات التي طرأت على قوانين السرية والخصوصية ومعاييرها القياسية (مثل النظام الأوربي العام لحماية البيانات والنقاش العالمي عن السرية والخصوصية الذي أثاره هذا النظام)، قرر الفريق القانوني التابع لمؤسسة ويكيميديا حماية سرية وخصوصية المستخدمين عن طريق إخفاء عناوين الآي بي عن عيون العامة. إلا أننا سنستمر في منح إمكانية الوصول إلى المستخدمين الذين يحتاجون لرؤية العناوين لحماية مواقع الويكي.

نعلم أن هذا التغيير سوف يؤثر على تدفقات عمل مكافحة الإساءة القائمة. ونحن ملتزمون بتصميم أدوات أو صيانة إمكانية الوصول إلى أدوات يمكنها تحديد ومنع المخربين ودمى الجورب والمحررين ممن تتضارب مصالحهم مع آخرين وغيرهم من سيئي النية بعد إخفاء عناوين الآي بي.

آخر الأخبار

April 2023: خطة إخفاء عنوان الآي بي

كما وعدنا، إليكم تحديث في شأن كيفية عمل إخفاء عنوان الآي بي. سيتناول هذا التحديث التغييرات التي طرأت على كلا من المحررين غير المسجلين والمسجلين. نريد أن نعترف من البداية أنه لا يزال أمامنا الكثير من الأسئلة المطروحة دون إجابة وأمور لم نتخذ قرار في شأنها. هذه هي خطتنا المبدئية وهي لا تتناول كل شيء نستهدف تحقيقه أثناء هذا المشروع. وبينما نمضي قُدُمًا نكتشف أجزاء جديدة من أعمال لم نتوقعها في السابق. آرائكم وملاحظاتكم ستساعدنا في استيعاب ما الذي يمكننا عمله أكثر كي نجعل من أعمال إخفاء عنوان الآي بي أسهل على مجتمعاتنا.

صمم هذا التحديث في صيغة أسئلة متكررة شائعة منذ أن هذه الصيغة تجعل من التغييرات القادمة واضحة وسهلة الاستيعاب.

ماذا يعني تغيير إخفاء عنوان الآي بي من منظور محرر غير مسجل الدخول؟

في الوقت الراهن، قبل أن ينتهي مستخدم غير مسجل الدخول من تعديل ما، سيبلغ المستخدم أن تعديلاته سوف توعز إلى عنوان الآي بي الذي يستخدمه. في المستقبل، قبل أن ينتهي مستخدم غير مسجل الدخول من تعديل ما، سيبلغ المستخدم أن تعديلاته سوف توعز إلى حساب مؤقت. سيكون اسم الحساب رقم، يزيد لكل حساب جديد. سوف يربط الحساب بملف تعريف ارتباط يحفظ في متصفح المستخدم. طالما أن ملف تعريف الارتباط هذا موجود، سيحتفظ المستخدم بذات الحساب المؤقت، وستوعز كافة تعديلاته إلى ذلك الحساب. يجوز أن تتغير عناوين آي بي المستخدم، إلا أن الحساب المؤقت لن يتغير طالما أن ملف تعريف الارتباط موجود. سيعمل أي حساب مؤقت ولّد على موقع ويكي على مواقع ويكي أخرى ربما يساهم فيها المستخدم.

ماذا سيكون شكل وصيغة أسماء المستخدمين المؤقتة؟

حتى الآن لا نعلم. نماذجنا المبدئية نظرت بعين الاعتبار لاستخدام علامة النجمة في صفة بادئة يتبعها رقم يزيد آليًا. (مثال: *12345.) سوف تجد هذه النماذج تاليًا. إلا أن بعض المتطوعين لفتوا انتباهنا لأمر ما وهو أن النجمة ليست خيار مناسب بسبب وجود عطل برمجي قائم في برمجيات ميدياويكي.

حاليًا نناقش خيارات بادئات مختلفة وسوف نجري اختبارات مستخدمين بها. الخيارات الأولى التي نرشحها (بترتيب غير مقصود) هي كما يلي:

  • علامة الإقحام (^) - User:^12345
  • الشرطة (-) - User:-12345
  • علامة المد (~) - User:~12345
  • علامة التعجب (!) - User:!12345
  • علامة الاستفهام (?)[1]User:?12345
  • بادئة السنة - User:2023-12345

أي مما سلف تراه خيارًا رائعًا أو سيئًا؟ يرجى إضافة تعليقاتكم سواء على صفحة النقاش أو على فبريكاتور.

  1. (ربما تكون علامة الاستفهام علامة رائعة على شيء مجهول ويعلمها الكثير، توجد تفاصيل لا زلنا نحاول استيعابها. على سبيل المثال، سيجب ترميزها في معرف المواقع الموحد باستخدام %3F. لا يجب أن يكون هذا الترميز مشكلةً، إلا أنه سيكون مبعث مشاكل للمستخدمين الذين اعتادوا طباعة معرفات المواقع الموحدة يدويًا.)

إلى أي مدة ستظل عناوين المستخدمين المؤقتة؟

لبرهة بعد التعديل الأول (ربما ستكون سنة واحدة) أو نتيجة لمسح الحفظ المؤقت لدى المستخدم، سوف تنتهي صلاحية ملف تعريف الارتباط تلقائيًا. إلا أن التعديلات القائمة ستوعز إلى ذات حساب المستخدم. بعد انتهاء صلاحية حساب المستخدم القديم، لو عدّل المستخدم مرة أخرى في المستقبل، سيمنح حسابًا مؤقتًا جديدًا.

ماذا يعني تغيير إخفاء عنوان الآي بي من منظور مراقب تعديلات؟

تقليل التعرض لعناوين الآي بي

إن التغيير الأكبر هو أن عناوين الآي بي لن تصبح منظورة للعموم. أي شخص ليس لديه حساب أو لا يستوفي الحد الأدنى اللازم للوصول إلى عناوين الآي بي (طالع التحديث القانوني) لن يمكنه الاطلاع على عناوين الآي بي. من أجل تقليل أثر ذلك على مراقبة التعديلات، سوف ندشن تحسينات على سمة معلومات عناوين الآي بي. سيشتمل هذا الأمر على بيانات من خدمة Spur.

الحصول على إمكانية وصول إلى عناوين الآي بي

يدًا بيد مع القسم القانوني التابع للمؤسسة، صُغنا توجيهات جديدة. تعرّف هذه التوجيهات من سيمكنه الوصول إلى عناوين الآي بي وكيف. سيمكن للمستخدمين الذين يستوفون المتطلبات اختيار الكشف عن عناوين الآي بي من صفحة خاص:تفضيلات. طالع كيفية عمل خاصية الكشف بالتفصيل. سوف تسجل إمكانية الوصول والكشف هذه في سجل وستكون متاحة لمجموعة محدودة من المستخدمين (التحقق من المستخدمين والمضيفون وفريق الثقة والسلامة).

قنوات اتصال أفضل مع المحررين ذوي الحسابات المؤقتة

سوف تربط الحسابات المؤقتة بملف تعريف ارتباط محفوظ في المتصفح. طالما أن ملف تعريف الارتباط موجود، سوف توعز تعديلات المستخدم إلى نفس الحساب المؤقت. سيتمكن أيضًا أصحاب الحسابات المؤقتة من تلقي إشعارات على صفحة النقاش كما هو الحال مع المستخدمين المسجلين. نأمل أن يفسح هذا الأمر المجال لاتصال أفضل مع المستخدمين ذوي الحسابات المؤقتة. كما أن هذا الأمر يجوز أن يحل بعض المشاكل طويلة الأجل التي طرحتها المجتمعات (طالع T278838).

توثيق عناوين الآي بي التي يستخدمها المخربون

سيصبح ممكنًا توثيق عناوين الآي بي التي يستخدمها ذوي النوايا السيئة توثيقًا للعموم عن طريق صفحات الإساءة طويلة الأجل، كما هو الحال حاليًا. إلا أنه يجب توخي الحذر وتجنب الكشف عن عناوين الآي بي التي يستخدمها أصحاب الحسابات المؤقتة الآخرين. أثناء مناقشة أفعال أصحاب النوايا السيئة، يجب استخدام أدوات مثل الإخفاء لو تبين أن المستخدم غير مخرب حينما ثار الشك في نواياه. يمكن الاطلاع على مزيد من التفاصيل عن هذا الأمر في التوجيهات.

الأدوات المتاحة لأغراض مراقبة التعديلات

كما هو الحال مع المحررين من عناوين آي بي، يمكن التحقق من المستخدمين أصحاب الحسابات المؤقتة ومراقبة تعديلاتهم عن طريق خاص:منع أو خاص:تحقق من مستخدم أو خاص:تحقق. خلاف ذلك، يمكن استخدام سمة معلومات عناوين الآي بي للوصول إلى معلومات عن عناوين الآي بي المستخدمة لأي مراجعة كانت.

نصوغ حاليًا توجيهات لأدوات وبوتات للسحابة الحاسوبية للوصل إلى عناوين الآي بي لأغراض مراقبة التعديلات. سوف ننشر تحديث عن هذا الأمر قريبًا.

ما سيحدث إلى عناوين الآي بي القائمة على مواقعنا؟

عناوين الآي بي القائمة المسجلة من قبل على مواقعنا الويكي ستظل كما هي. التعديلات الآتية بعد تنفيذ إخفاء عنوان الآي بي سوف تعزى إلى أسماء مستخدمين مؤقتة. منذ أننا سوف ندشن خاصية إخفاء عناوين الآي بي تدريجيًا، سيعني هذا أن هذا التغيير سوف يحدث على مواقع ويكي مختلفة في أوقات متفاوتة.

كيف ستعمل خاصية الكشف عن عناوين الآي بي؟

سيتمكن المستخدمون الذين يمكنهم الوصول إلى عناوين الآي بي من كشف عناوين آي بي الحسابات المؤقتة. إليكم مثال على كيفية عمل هذه الخاصية:

ماذا سيحدث للأدوات والبوتات التي تعتمد في عملها على عناوين الآي بي؟

نعكف على استيعاب أثر هذا الأمر على الأدوات التي يتولى صيانتها متطوعين. هذه مهمة ينهض بها فريقنا وكذلك فريقي الأبحاث والهندسة. بعد ذلك سوف نتعاون مع الفريق القانوني لاستيعاب ما هي الأدوات التي يجوز لها الاستمرار في الوصول إلى عناوين الآي بي والتوجيهات الخاصة بالكيفية التي يمكن بها تنفيذ عملها. سوف ننشر تحديثًا على هذه الصفحة حال وجود خطة عمل في هذا الشأن.

خطط التنفيذ

نعتزم اختبار أعمال إخفاء عناوين الآي بي ببطء، وسيشمل ذلك إفساح ما يكفي من وقت كي تقدم المجتمعات آرائها وملاحظاتها وكذلك اختبار الخاصية. نرغب في ألا ينتج عن تنفيذنا لهذه الخاصية عرقلة أعمال المجتمعات. أولويتنا الأخرى هي تجنب حدوث نواتج غير مرغوبة على صحة المجتمعات وسلامتها. لهذا السبب طبقّنا مقاييس نعتزم مراقبتها بينما ننفذ التغييرات المخطط لها.

نبحث عن مجتمعات ترغب في أن تصبح مرشحة لاختبار تدشين (تجربة) خاصية إخفاء عناوين الآي بي. نفكر جديًا بعض المعايير مثل عدد التعديلات الآتية من عناوين آي بي التي تتلقاها المجتمعات ومدى عجالة أعمال مكافحة التخريب وحجم المشاريع واحتمال حدوث اضطرابات. سوف ننشر تحديث آخر على هذه الصفحة عن الجهات المرشحة التي وقع علينا اختيارنا في موعد قريب من تشدين خاصية إخفاء عناوين الآي بي. لو كنت ترغب في أن يختبر مجتمعك تدشين خاصية إخفاء عناوين الآي بي، يرجى اتخاذ قرار في صفة مجتمع وإبلاغنا بذلك على صفحة النقاش.

بيانات عن تعطيل ويكيبيديا البرتغالية لإمكانية التعديل عن طريق عنوان آي بي

المقاييس التي استخدمتها ويكيبيديا البرتغالية بعد فرض القيد

تحديث 30 أغسطس/آب 2021
مرحبًا. إليكم تحديث قصير عن المقاييس التي استخدمتها ويكيبيديا البرتغالية منذ أنهم اشترطوا التسجيل لتعديل الموقع. لدينا تقرير شامل على صفحة تقرير الأثر. يشتمل هذا التقرير على مقاييس سجلت عن طريق بيانات وكذلك استبيانات إجاب عنها مساهمين نشطاء في ويكيبيديا البرتغالية.

بوجه عام، يعرض التقرير هذا التغيير عرضًا إيجابيًا. لم نرَ أي تعطيل كبير الشأن طوال المدة التي سجلنا فيها هذه المقاييس. نظرًا لهذا، شجعنا الأمر أن ننفذ تجربة على مشروعين اثنين إضافيين كي نرى هل سنرى ذات الأثر أم لا. كافة المشاريع فريدة بشكل أو بآخر وما ينطبق على ويكيبيديا البرتغالية قد لا يسري على مشروع آخر. نرغب في تنظيم تجربة محددة الوقت على مشروعين اثنين حيث سيتطلب الأمر إلزام المستخدمين بالتسجيل ليتمكنوا من التعديل. تقديرنا للأمر هو أن هذا الجهد سيستغرق حوالي 8 أشهر كي نجمع ما يكفي من بيانات كي نرى تغييرات كبيرة الشأن. بعد هذه المدة، سوف نرجع إلى عدم اشتراط التسجيل للتعديل بينما نحلل البيانات. حال نشر البيانات، سيتمكن المجتمع من اتخاذ قرار ما إذا كان يرغب في مواصلة منع التعديلات من غير المسجلين على المشروع أم لا.

نطلق على هذا الجهد اسم تجربة اشتراط تسجيل الدخول. سوف تجد مزيد من التفاصيل وكذلك جدول زمني على تلك الصفحة. يرجى استخدام تلك الصفحة وكذا صفحة نقاشها كي تناقش هذا الأمر.

قيود على التعديل باستخدام عناوين آي بي على ويكيبيديا البرتغالية

تحديث
قامت ويكيبيديا البرتغالية بمنع المحررين غير المسجلين عن تنفيذ تعديلات على المشروع السنة الماضية. طوال الأشهر القليلة الماضية، جمع فريقنا بيانات عن تبعات هذا التغيير على الصحة والسلامة العمومية للمشروع. كما تحدثنا مع عدد من أعضاء المجتمع في شأن تجربتهم مع الأمر. نعمل على التفاصيل النهائية كي نجمع كافة البيانات التي تعرض صورة دقيقة عن حالة المشروع. نأمل أن يكون التحديث في هذا الشأن جاهزًا في المستقبل القريب.

أدوات

تصميم الأدوات

تحديث 2

As you might already know, we are working on building some new tools, partly to soften the impact of IP Masking, but also just to build better anti-vandalism tools for everyone. It is not a secret that the state of moderation tools on our projects doesn’t give the communities the tools they deserve. There is a lot of scope for improvement. We want to build tools that make it easier for anti-vandalism fighters to work effectively. We also want to reduce the barrier to entry into these roles for non-technical contributors.

We have talked about ideas for these tools before and I will provide a brief update on these below. Note that progress on these tools has been slow in the last few months as our team is working on overhauling SecurePoll to meet the needs of the upcoming WMF Board elections.

ميزة معلومات عناوين الآي بي

 
نموذج محاكي لمعلومات عناوين الآي بي

We are building a tool that will display important information about an IP address which is commonly sought in investigations. Typically patrollers, admins and checkusers rely on external websites to provide this information. We hope to make this process easier for them by integrating information from reliable IP-vendors within our websites. We recently built a prototype and conducted a round of user testing to validate our approach. We found that a majority of the editors in the interview set found the tool helpful and indicated they would like to use it in the future. There is an update on the project page that I would like to draw your attention to.

Key questions that we would like to have your feedback on the project talk page:

  • When investigating an IP what kinds of information do you look for? Which page are you likely on when looking for this information?
  • What kinds of IP information do you find most useful?
  • What kinds of IP information, when shared, do you think could put our anonymous editors at risk?

ميزة ربط المحررين

This project has also been referred to as "Nearby editors" and "Sockpuppet detection" in earlier conversations. We are trying to find a suitable name for it that is understandable even to people who don't understand the word sockpuppetry.

We are in the early stages of this project. Wikimedia Foundation Research has a project that could assist in detecting when two editors exhibit similar editing behaviors. This will help connect different unregistered editors when they edit under different auto-generated account usernames. We heard a lot of support for this project when we started talking about it a year ago. We also heard about the risks of developing such a feature. We are planning to build a prototype in the near term and share it with the community. There is a malnourished project page for this project. We hope to have an update for it soon. Your thoughts on this project are very welcome on the project talk page.

تحديث 1

Like mentioned previously, our foremost goal is to provide better anti-vandalism tools for our communities which will provide a better moderation experience for our vandal fighters while also working towards making the IP address string less valuable for them. Another important reason to do this is that IP addresses are hard to understand and are really very useful only to tech-savvy users. This creates a barrier for new users without any technical background to enter into functionary roles as there is a higher learning curve for them to work with IP addresses. We hope to get to a place where we can have moderation tools that anyone can use without much prior knowledge.

The first thing we decided to focus on was to make the CheckUser tool more flexible, powerful and easy to use. It is an important tool that services the need to detect and block bad actors (especially long-term abusers) on a lot of our projects. The CheckUser tool was not very well maintained for many years and as a result it appeared quite dated and lacked necessary features.

We also anticipated an uptick in the number of users who opt-in to the role of becoming a CheckUser on our projects once IP Masking goes into effect. This reinforced the need for a better, easier CheckUser experience for our users. With that in mind, the Anti-Harassment Tools team spent the past year working on improving the CheckUser tool – making it much more efficient and user-friendly. This work has also taken into account a lot of outstanding feature requests by the community. We have continually consulted with CheckUsers and stewards over the course of this project and have tried our best to deliver on their expectations. The new feature is set to go live on all projects in October 2020.

The next feature that we are working on is IP info. We decided on this project after a round of consultation on six wikis which helped us narrow down the use cases for IP addresses on our projects. It became apparent early on that there are some critical pieces of information that IP addresses provide which need to be made available for patrollers to be able to do their roles effectively. The goal for IP Info, thus, is to quickly and easily surface significant information about an IP address. IP addresses provide important information such as location, organization, possibility of being a Tor/VPN node, rDNS, listed range, to mention a few examples. By being able to show this, quickly and easily without the need for external tools everyone can’t use, we hope to be able to make it easier for patrollers to do their job. The information provided is high-level enough that we can show it without endangering the anonymous user. At the same time, it is enough information for patrollers to be able to make quality judgements about an IP address.

After IP Info we will be focusing on a finding similar editors feature. We’ll be using a machine learning model, built in collaboration with CheckUsers and trained on historical CheckUser data to compare user behavior and flag when two or more users appear to be behaving very similarly. The model will take into account which pages users are active on, their writing styles, editing times etc. to make predictions about how similar two users are. We are doing our due diligence in making sure the model is as accurate as possible.

Once it’s ready, there is a lot of scope for what such a model can do. As a first step we will be launching it to help CheckUsers detect socks easily without having to perform a lot of manual labor. In the future, we can think about how we can expose this tool to more people and apply it to detect malicious sockpuppeting rings and disinformation campaigns.

You can read more and leave comments on our project page for tools.

الأبحاث

تقرير أثر إخفاء عناوين الآي بي

IP addresses are valuable as a semi-reliable partial identifier, which is not easily manipulated by their associated user. Depending on provider and device configuration, IP address information is not always accurate or precise, and deep technical knowledge and fluency is needed to make best use of IP address information, though administrators are not currently required to demonstrate such fluency to have access. This technical information is used to support additional information (referred to as “behavioural knowledge”) where possible, and the information taken from IP addresses significantly impact the course of administrative action taken.

 
A Wikimedia Foundation-supported report on the impact that IP masking will have on our community.

On the social side, the issue of whether to allow unregistered users to edit has been a subject of extensive debate. So far, it has erred on the side of allowing unregistered users to edit. The debate is generally framed around a desire to halt vandalism, versus preserving the ability for pseudo-anonymous editing and lowering the barrier to edit. There is a perception of bias against unregistered users because of their association with vandalism, which also appears as algorithmic bias in tools such as ORES. Additionally, there are major communications issues when trying to talk to unregistered users, largely due to lack of notifications, and because there is no guarantee that the same person will be reading the messages sent to that IP talk page.

In terms of the potential impact of IP masking, it will significantly impact administrator workflows and may increase the burden on CheckUsers in the short term. If or when IP addresses are masked, we should expect our administrators' ability to manage vandalism to be greatly hindered. This can be mitigated by providing tools with equivalent or greater functionality, but we should expect a transitional period marked by reduced administrator efficacy. In order to provide proper tool support for our administrators’ work, we must be careful to preserve or provide alternatives to the following functions currently fulfilled by IP information:

  • كفاءة المنع والتقييم الختامي
  • Some way of surfacing similarities or patterns among unregistered users, such as geographic similarity, certain institutions (e.g. if edits are coming from a high school or university)
  • The ability to target specific groups of unregistered users, such as vandals jumping IPs within a specific range
  • Location or institution-specific actions (not necessarily blocks); for example, the ability to determine if edits are made from an open proxy, or public location like a school or public library.

Depending on how we handle temporary accounts or identifiers for unregistered users, we may be able to improve communication to unregistered users. Underlying discussions and concerns around unregistered editing, anonymous vandalism, and bias against unregistered users are unlikely to significantly change if we mask IPs, provided we maintain the ability to edit projects while logged out.

تدفق عمل التحقق من المستخدمين

We interviewed CheckUsers on multiple projects throughout our process for designing the new Special:Investigate tool. Based on interviews and walkthroughs of real-life cases, we broke down the general CheckUser workflow into five sections:

  • Triaging: assessing cases for feasibility and complexity.
  • Profiling: creating a pattern of behaviour which will identify the user behind multiple accounts.
  • Checking: examining IPs and useragents using the CheckUser tool.
  • Judgement: matching this technical information against the behavioural information established in the Profiling step, in order to make a final decision about what kind of administrative action to take.
  • Closing: reporting the outcome of the investigation on public and private platforms where necessary, and appropriately archiving information for future use.

We also worked with staff from Trust and Safety to get a sense for how the CheckUser tool factors into Wikimedia Foundation investigations and cases that are escalated to T&S.

The most common and obvious pain points all revolved around the CheckUser tool's unintuitive information presentation, and the need to open up every single link in a new tab. This caused massive confusion as tab proliferation quickly got out of hand. To make matters worse, the information that CheckUser surfaces is highly technical and not easy to understand at first glance, making the tabs difficult to track. All of our interviewees said that they resorted to separate software or physical pen and paper in order to keep track of information.

We also ran some basic analyses of English Wikipedia's Sockpuppet Investigations page to get some baseline metrics on how many cases they process, how many are rejected, and how many sockpuppets a given report contains.

استخدام مراقبو التعديلات لعناوين الآي بي

Previous research on patrolling on our projects has generally focused on the workload or workflow of patrollers. Most recently, the Patrolling on Wikipedia study focuses on the workflows of patrollers and identifying potential threats to current anti-vandal practices. Older studies, such as the New Page Patrol survey and the Patroller work load study, focused on English Wikipedia. They also look solely at the workload of patrollers, and more specifically on how bot patrolling tools have affected patroller workloads.

Our study tried to recruit from five target wikis, which were

  • Japanese Wikipedia
  • Dutch Wikipedia
  • German Wikipedia
  • Chinese Wikipedia
  • English Wikiquote

They were selected for known attitudes towards IP edits, percentage of monthly edits made by IPs, and any other unique or unusual circumstances faced by IP editors (namely, use of the Pending Changes feature and widespread use of proxies). Participants were recruited via open calls on Village Pumps or the local equivalent. Where possible, we also posted on Wiki Embassy pages. Unfortunately, while we had interpretation support for the interviews themselves, we did not extend translation support to the messages, which may have accounted for low response rates. All interviews were conducted via Zoom, with a note-taker in attendance.

Supporting the findings from previous studies, we did not find a systematic or unified use of IP information. Additionally, this information was only sought out after a certain threshold of suspicion. Most further investigation of suspicious user activity begins with publicly available on-wiki information, such as checking previous local edits, Global Contributions, or looking for previous bans.

Precision and accuracy were less important qualities for IP information: upon seeing that one chosen IP information site returned three different results for the geographical location of the same IP address, one of our interviewees mentioned that precision in location was not as important as consistency. That is to say, so long as an IP address was consistently exposed as being from one country, it mattered less if it was correct or precise. This fits with our understanding of how IP address information is used: as a semi-unique piece of information associated with a single device or person, that is relatively hard to spoof for the average person. The accuracy or precision of the information attached to the user is less important than the fact that it is attached and difficult to change.

Our findings highlight a few key design aspects for the IP info tool:

  • Provide at-a-glance conclusions over raw data
  • Cover key aspects of IP information:
    • Geolocation (to a city or district level where possible)
    • Registered organization
    • Connection type (high-traffic, such as data center or mobile network versus low-traffic, such as residential broadband)
    • Proxy status as binary yes or no

As an ethical point, it will be important to be able to explain how any conclusions are reached, and the inaccuracy or imprecisions inherent in pulling IP information. While this was not a major concern for the patrollers we talked to, if we are to create a tool that will be used to provide justifications for administrative action, we should be careful to make it clear what the limitations of our tools are.

بيانات صادرة عن القسم القانوني التابع لمؤسسة ويكيميديا

آخر الأخبار

مارس 2023

Hello! Please review the new Access to temporary account IP addresses page for details about how users can gain access to IP addresses. The section on using IP addresses will be updated with details about how and where to access the IP addresses, as well as what is logged when IP addresses are accessed. Please also review a new related page with frequently asked questions. You will notice that both pages use the term "temporary user accounts," which comes from the MVP—more information about the MVP will be shared directly on this page soon. If you have questions or concerns, please reach out on the talk page.

يوليو 2021

First of all, we’d like to thank everyone for participating in these discussions. We appreciate the attention to detail, the careful consideration, and the time that has gone into engaging in this conversation, raising questions and concerns, and suggesting ways that the introduction of masked IPs can be successful. Today, we’d like to explain in a bit more detail how this project came about and the risks that inspired this work, answer some of the questions that have been raised so far, and briefly talk about next steps.

الخلفية

To explain how we arrived here, we’d like to briefly look backwards. Wikipedia and its sibling projects were built to last. Sharing the sum of all knowledge isn’t something that can be done in a year, or ten years, or any of our lifetimes. But while the mission of the communities and Foundation was created for the long term, the technical and governance structures that enable that mission were very much of the time they were designed. Many of these features have endured, and thrived, as the context in which they operate has changed. Over the last 20 years, a lot has evolved: the way societies use and relate to the internet, the regulations and policies that impact how online platforms run as well as the expectations that users have for how a website will handle their data.

In the past five years in particular, users and governments have become more and more concerned about online privacy and the collection, storage, handling, and sharing of personal data. In many ways, the projects were ahead of the rest of the internet: privacy and anonymity are key to users’ ability to share and consume free knowledge. The Foundation has long collected little information about users, not required an email address for registration, and recognized that IP addresses are personal data (see, for example, the 2014–2018 version of our Privacy policy). More recently, the conversation about privacy has begun to shift, inspiring new laws and best practices: the European Union’s General Data Protection Regulation, which went into effect in May 2018, has set the tone for a global dialogue about personal data and what rights individuals should have to understand and control its use. In the last few years, data protection laws around the world have been changing—look at the range of conversations, draft bills, and new laws in, for example, Brazil, India, Japan, or the United States.

المخاطر القانونية

The Foundation’s Privacy team is consistently monitoring this conversation, assessing our practices, and planning for the future. It is our job to look at the projects of today, and evaluate how we can help prepare them to operate within the legal and societal frameworks of tomorrow. A few years ago, as part of this work, we assessed that the current system of publishing IP addresses of non-logged-in contributors should change. We believe it creates risk to users whose information is published in this way. Many do not expect it—even with the notices explaining how attribution works on the projects, the Privacy team often hears from users who have made an edit and are surprised to see their IP address on the history page. Some of them are in locations where the projects are controversial, and they worry that the exposure of their IP address may allow their government to target them. The legal frameworks that we foresaw are in operation, and the publication of these IP addresses pose real risks to the projects and users today.

We’ve heard from several of you that you want to understand more deeply what the legal risks are that inspired this project, whether the Foundation is currently facing legal action, what consequences we think might result if we do not mask IP addresses, etc. (many of these questions have been collected in the expanded list at the end of this section). We’re sorry that we can’t provide more information, since we need to keep some details of the risks privileged. “Privileged” means that a lawyer must keep something confidential, because revealing it could cause harm to their client. That’s why privilege is rarely waived; it’s a formal concept in the legal systems of multiple countries, and it exists for very practical reasons—to protect the client. Here, waiving the privilege and revealing this information could harm the projects and the Foundation. Generally, the Legal Affairs team works to be as transparent as possible; however, an important part of our legal strategy is to approach each problem on a case by case basis. If we publicly discuss privileged information about what specific arguments might be made, or what risks we think are most likely to result in litigation, that could create a road map by which someone could seek to harm the projects and the communities.

That said, we have examined this risk from several angles, taking into account the legal and policy situation in various countries around the world, as well as concerns and oversight requests from users whose IP addresses have been published, and we concluded that IP addresses of non-logged-in users should no longer be publicly visible, largely because they can be associated with a single user or device, and therefore could be used to identify and locate non-logged-in users and link them with their on-wiki activity.

Despite these concerns, we also understood that IP addresses play a major part in the protection of the projects, allowing users to fight vandalism and abuse. We knew that this was a question we’d need to tackle holistically. That’s why a working group from different parts of the Wikimedia Foundation was assembled to examine this question and make a recommendation to senior leadership. When the decision was taken to proceed with IP masking, we all understood that we needed to do this with the communities—that only by taking your observations and ideas into account would we be able to successfully move through this transition.

I want to emphasize that even when IP addresses are masked and new tools are in place to support your anti-vandalism work, this project will not simply end. It’s going to be an iterative process—we will want feedback from you as to what works and what doesn’t, so that the new tools can be improved and adapted to fit your needs.

أسئلة

Over the past months, you’ve had questions, and often, we’ve been unable to provide the level of detail you’re hoping for in our answers, particularly around legal issues.

Q: What specific legal risks are you worried about?

A: We cannot provide details about the individual legal risks that we are evaluating. We realize it’s frustrating to ask why and simply get, “that’s privileged” as an answer. And we’re sorry that we cannot provide more specifics, but as explained above, we do need to keep the details of our risk assessment, and the potential legal issues we see on the horizon, confidential, because providing those details could help someone figure out how to harm the projects, communities, and Foundation.

There are settled answers to some questions.

Q: Is this project proceeding?

A: Yes, we are moving forward with finding and executing on the best way to hide IP addresses of non-logged-in contributors, while preserving the communities’ ability to protect the projects.

Q: Can this change be rolled out differently by location?

A: No. We strive to protect the privacy of all users to the same standard; this will change across the Wikimedia projects.

Q: If other information about non-logged-in contributors is revealed (such as location, or ISP), then it doesn’t matter if the IP address is also published, right?

A: That’s not quite the case. In the new system, the information we make available will be general information that is not linked to an individual person or device—for example, providing a city-level location, or noting that an edit was made by someone at a particular university. While this is still information about the user, it’s less specific and individual than an IP address. So even though we are making some information available in order to assist with abuse prevention, we are doing a better job of protecting the privacy of that specific contributor.

Q: If we tell someone their IP address will be published, isn’t that enough?

A: No. As mentioned above, many people have been confused to see their IP address published. Additionally, even when someone does see the notice, the Foundation has legal responsibilities to properly handle their personal data. We have concluded that we should not publish the IP addresses of non-logged-in contributors because it falls short of current privacy best practices, and because of the risks it creates, including risks to those users.

Q: How will masking impact CC-BY-SA attribution?

A: IP masking will not affect CC license attribution on Wikipedia. The 3.0 license for text on the Wikimedia projects already states that attribution should include “​​the name of the Original Author (or pseudonym, if applicable)” (see the license at section 4c) and use of an IP masking structure rather than an IP address functions equally well as a pseudonym. IP addresses already may vary or be assigned to different people over time, so using that as a proxy for un-registered editors is not different in quality from an IP masking structure and both satisfy the license pseudonym structure. In addition, our Terms of use section 7 specify that as part of contributing to Wikipedia, editors agree that links to articles (which include article history) are a sufficient method of attribution.

And sometimes, we don’t know the answer to a question yet, because we’d like to work with you to find the solution.

Q: What should the specific qualifications be for someone to apply for this new user right?

A: There will be an age limit; we have not made a definitive decision about the limit yet, but it’s likely they will need to be at least 16 years old. Additionally, they should be active, established community members in good standing. We’d like to work through what that means with you.

I see that the team preparing these changes is proposing to create a new userright for users to have access to the IP addresses behind a mask. Does Legal have an opinion on whether access to the full IP address associated with a particular username mask constitutes nonpublic personal information as defined by the Confidentiality agreement for nonpublic information, and will users seeking this new userright be required to sign the Access to nonpublic personal data policy or some version of it?
1 If yes, then will I as a checkuser be able to discuss relationships between registered accounts and their IP addresses with holders of this new userright, as I currently do with other signatories?
2 If no, then could someone try to explain why we are going to all this trouble for information that we don't consider nonpublic?
3 In either case, will a checkuser be permitted to disclose connections between registered accounts and unregistered username masks?

A: This is a great question. The answer is partially yes. First, yes, anyone who has access to the right will need to acknowledge in some way that they are accessing this information for the purposes of fighting vandalism and abuse on the projects. We are working on how this acknowledgement will be made; the process to gain access is likely to be something less complex than signing the access to non-public personal data agreement.

As to how this would impact CUs, right now, the access to non-public personal data policy allows users with access to non-public personal data to share that data with other users who are also able to view it. So a CU can share data with other CUs in order to carry out their work. Here, we are maintaining a distinction between logged-in and logged-out users, so a CU would not be able to share IP addresses of logged-in users with users who have this new right, because users with the new right would not have access to such information.

Presuming that the CU also opts in to see IP addresses of non-logged-in users, under the current scheme, that CU would be able to share IP address information demonstrating connections between logged-in users and non-logged-in users who had been masked with other CUs who had also opted in. They could also indicate to users with the new right that they detected connections between logged-in and non-logged-in users. However, the CU could not directly the share IP addresses of the logged-in users with non-CU users who only have the new right.

Please let us know if this sounds unworkable. As mentioned above, we are figuring out the details, and want to get your feedback to make sure it works.

الخطوات التالية

Over the next few months, we will be rolling out more detailed plans and prototypes for the tools we are building or planning to build. We’ll want to get your feedback on these new tools that will help protect the projects. We’ll continue to try to answer your questions when we can, and seek your thoughts when we should arrive at the answer together. With your feedback, we can create a plan that will allow us to better protect non-logged-in editors’ personal data, while not sacrificing the protection of Wikimedia users or sites. We appreciate your ideas, your questions, and your engagement with this project.

أكتوبر 2020

This statement from the Wikimedia Foundation Legal department was written on request for the talk page and comes from that context. For visibility, we wanted you to be able to read it here too.

Hello All. This is a note from the Legal Affairs team. First, we’d like to thank everyone for their thoughtful comments. Please understand that sometimes, as lawyers, we can’t publicly share all of the details of our thinking; but we read your comments and perspectives, and they’re very helpful for us in advising the Foundation.

On some occasions, we need to keep specifics of our work or our advice to the organization confidential, due to the rules of legal ethics and legal privilege that control how lawyers must handle information about the work they do. We realize that our inability to spell out precisely what we’re thinking and why we might or might not do something can be frustrating in some instances, including this one. Although we can’t always disclose the details, we can confirm that our overall goals are to do the best we can to protect the projects and the communities at the same time as we ensure that the Foundation follows applicable law.

Within the Legal Affairs team, the privacy group focuses on ensuring that the Foundation-hosted sites and our data collection and handling practices are in line with relevant law, with our own privacy-related policies, and with our privacy values. We believe that individual privacy for contributors and readers is necessary to enable the creation, sharing, and consumption of free knowledge worldwide. As part of that work, we look first at applicable law, further informed by a mosaic of user questions, concerns, and requests, public policy concerns, organizational policies, and industry best practices to help steer privacy-related work at the Foundation. We take these inputs, and we design a legal strategy for the Foundation that guides our approach to privacy and related issues. In this particular case, careful consideration of these factors has led us to this effort to mask IPs of non-logged-in editors from exposure to all visitors to the Wikimedia projects. We can’t spell out the precise details of our deliberations, or the internal discussions and analyses that lay behind this decision, for the reasons discussed above regarding legal ethics and privilege.

We want to emphasize that the specifics of how we do this are flexible; we are looking for the best way to achieve this goal in line with supporting community needs. There are several potential options on the table, and we want to make sure that we find the implementation in partnership with you. We realize that you may have more questions, and we want to be clear upfront that in this dialogue we may not be able to answer the ones that have legal aspects. Thank you to everyone who has taken the time to consider this work and provide your opinions, concerns, and ideas.

––
مع أطيب التحيات،
فريق أدوات مكافحة التحرش

يرجى استخدام صفحة النقاش لمناقشة هذا الأمر. من أجل أية مشاكل متعلقة بهذا الإصدار، يرجى عدم التردد في التواصل مع نيهاريكا كوهلي مديرة المنتج - niharika wikimedia.org وكذلك إرسال نسخة إلى Whatamidoing اختصاصي علاقات المجتمع - whatamidoing wikimedia.org أو ترك رسالة على صفحة النقاش.

لمزيد من المعلومات أو التوثيق في شأن التعديل باستخدام عناوين آي بي وإخفائها ونظرة عامة على ما جرى تنفيذه حتى الآن ويشمل ذلك نقاش المجتمع، يرجى الاطلاع على الوصلات الشبكية التالية.