Jump to content

Anonymous blog: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Trident13 (talk | contribs)
Trident13 (talk | contribs)
Line 44: Line 44:
According to many blog experts bloggers cannot have full anonymity because the world of internet can allow knowing someone better than they know themselves in many ways. While surfing through the web a lot of personal information is left on the virtual space that can be accessed without permission and even available for the public to search. Browsers, search engines and social networking sites (like Facebook, Twitter, LinkedIn and MySpace) are the prime sources through which the personal information can be retrieved. However there are tools that pose threat to anonymous blogger’s identity that are used for tracking. This includes the following:
According to many blog experts bloggers cannot have full anonymity because the world of internet can allow knowing someone better than they know themselves in many ways. While surfing through the web a lot of personal information is left on the virtual space that can be accessed without permission and even available for the public to search. Browsers, search engines and social networking sites (like Facebook, Twitter, LinkedIn and MySpace) are the prime sources through which the personal information can be retrieved. However there are tools that pose threat to anonymous blogger’s identity that are used for tracking. This includes the following:
*'''Cookies:''' [[HTTP cookie|Cookies]] are small pieces of data sent from a website and stored in a user's [[web browser]] while a user is browsing a website. When the user browses the same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the user's previous activity.<ref>{{cite web | url = http://tools.ietf.org/html/rfc6265#section-3 | work=IETF | title= HTTP State Management Mechanism – Overview |date=2011-04}}</ref> Cookies were designed to be a reliable mechanism for websites to remember the [[program state|state]] of the website or activity the user had taken in the past. This can include clicking particular buttons, [[Authentication|logging in]], or a record of which pages were visited by the user even months or years ago. Although cookies cannot carry [[Virus (computer)|viruses]], and cannot install [[malware]] on the host computer;<ref>Adam Penenberg. [http://www.slate.com/id/2129656/ Cookie Monsters]. [[Slate (magazine)|Slate]], November 7, 2005. "Cookies are not software. They can't be programmed, can't carry viruses, and can't unleash malware to go wilding through your hard drive."</ref> tracking cookies and especially third-party tracking cookies are commonly used as way to compile long-term records of individuals' browsing histories. In itself a major privacy concern that has prompted European and US law makers to take action,<ref name=eulaw>{{cite news | url = http://www.bbc.co.uk/news/technology-12668552 | work= BBC | title=New net rules set to make cookies crumble | date=2011-03-08}}</ref><ref>{{cite web | url = http://adage.com/article/digital/sen-rockefeller-ready-a-real-track-bill/227426/ | work=Adage.com |title=Sen. Rockefeller: Get Ready for a Real Do-Not-Track Bill for Online Advertising | date=2011-05-06}}</ref> cookies can be revealed to find out a blogger’s identity if not disabled.
*'''Cookies:''' [[HTTP cookie|Cookies]] are small pieces of data sent from a website and stored in a user's [[web browser]] while a user is browsing a website. When the user browses the same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the user's previous activity.<ref>{{cite web | url = http://tools.ietf.org/html/rfc6265#section-3 | work=IETF | title= HTTP State Management Mechanism – Overview |date=2011-04}}</ref> Cookies were designed to be a reliable mechanism for websites to remember the [[program state|state]] of the website or activity the user had taken in the past. This can include clicking particular buttons, [[Authentication|logging in]], or a record of which pages were visited by the user even months or years ago. Although cookies cannot carry [[Virus (computer)|viruses]], and cannot install [[malware]] on the host computer;<ref>Adam Penenberg. [http://www.slate.com/id/2129656/ Cookie Monsters]. [[Slate (magazine)|Slate]], November 7, 2005. "Cookies are not software. They can't be programmed, can't carry viruses, and can't unleash malware to go wilding through your hard drive."</ref> tracking cookies and especially third-party tracking cookies are commonly used as way to compile long-term records of individuals' browsing histories. In itself a major privacy concern that has prompted European and US law makers to take action,<ref name=eulaw>{{cite news | url = http://www.bbc.co.uk/news/technology-12668552 | work= BBC | title=New net rules set to make cookies crumble | date=2011-03-08}}</ref><ref>{{cite web | url = http://adage.com/article/digital/sen-rockefeller-ready-a-real-track-bill/227426/ | work=Adage.com |title=Sen. Rockefeller: Get Ready for a Real Do-Not-Track Bill for Online Advertising | date=2011-05-06}}</ref> cookies can be revealed to find out a blogger’s identity if not disabled.
*'''IP Addresses:''' an [[IP address|Internet Protocol address (IP address)]] is a numerical label assigned to each device (e.g., computer, printer) participating in a [[computer network]] that uses the [[Internet Protocol]] for communication.<ref name=rfc760>RFC 760, ''DOD Standard Internet Protocol'' (January 1980)</ref> An IP address serves two principal functions: host or network interface [[Identification (information)|identification]]; and location [[logical address|addressing]]. Its role has been characterized as follows: "''A [[hostname|name]] indicates what we seek. An address indicates where it is. A route indicates how to get there.''"<ref name=rfc791>RFC 791, ''Internet Protocol - DARPA Internet Program Protocol Specification'' (September 1981)</ref> IP addresses are [[binary number]]s, but they are usually stored in text files and displayed in [[human-readable]] notations, such as 172.16.254.1 (for [[IPv4]]), and 2001:db8:0:1234:0:567:8:1 (for [[IPv6]]). Due to the enormous growth of the [[Internet]] and the predicted [[IPv4 address exhaustion|depletion of available addresses]], a new addressing system ([[IPv6]]), using 128 bits for the address, was developed in 1995,<ref name=rfc1883>RFC 1883, ''Internet Protocol, Version 6 (IPv6) Specification'', S. Deering, R. Hinden (December 1995)</ref> standardized as RFC 2460 in 1998,<ref name =rfc2460>RFC 2460, ''Internet Protocol, Version 6 (IPv6) Specification'', S. Deering, R. Hinden, The Internet Society (December 1998)</ref> and its [[IPv6 deployment|deployment]] has been ongoing since the mid-2000s. The [[Internet Assigned Numbers Authority]] (IANA) manages the IP address space allocations globally and delegates five [[regional Internet registries]] (RIRs) to allocate IP address blocks to [[local Internet registry|local Internet registries]] ([[Internet service provider]]s) and other entities. They hence fully revealing location of the device, making IP addresses are one of the most popular ways to track and reveal identities as well as physical location. Anonymous bloggers need to take help from a lot of tools to hide their IP addresses from being tracked easily
*'''IP Addresses:''' an [[IP address|Internet Protocol address (IP address)]] is a numerical label assigned to each device (e.g., computer, printer) participating in a [[computer network]] that uses the [[Internet Protocol]] for communication.<ref name=rfc760>RFC 760, ''DOD Standard Internet Protocol'' (January 1980)</ref> An IP address serves two principal functions: host or network interface [[Identification (information)|identification]]; and location [[logical address|addressing]]. Its role has been characterized as follows: "''A [[hostname|name]] indicates what we seek. An address indicates where it is. A route indicates how to get there.''"<ref name=rfc791>RFC 791, ''Internet Protocol - DARPA Internet Program Protocol Specification'' (September 1981)</ref> IP addresses are [[binary number]]s, but they are usually stored in text files and displayed in [[human-readable]] notations, such as 172.16.254.1 (for [[IPv4]]), and 2001:db8:0:1234:0:567:8:1 (for [[IPv6]]). Due to the enormous growth of the [[Internet]] and the predicted [[IPv4 address exhaustion|depletion of available addresses]], a new addressing system ([[IPv6]]), using 128 bits for the address, was developed in 1995,<ref name=rfc1883>RFC 1883, ''Internet Protocol, Version 6 (IPv6) Specification'', S. Deering, R. Hinden (December 1995)</ref> standardized as RFC 2460 in 1998,<ref name =rfc2460>RFC 2460, ''Internet Protocol, Version 6 (IPv6) Specification'', S. Deering, R. Hinden, The Internet Society (December 1998)</ref> and its [[IPv6 deployment|deployment]] has been ongoing since the mid-2000s. The [[Internet Assigned Numbers Authority]] (IANA) manages the IP address space allocations globally and delegates five [[regional Internet registries]] (RIRs) to allocate IP address blocks to [[local Internet registry|local Internet registries]] ([[Internet service provider]]s) and other entities. They hence fully revealing location of the device, making IP addresses are one of the most popular ways to track and reveal identities as well as physical location. Anonymous bloggers need to take help from a lot of tools to hide their IP addresses from being tracked easily. Typical of the attitude of internet companies, Google will only reveal an IP address identity on being served a valid [[court order]], as they did in 2007 when the anonymous ''Skanks in NYC'' blog attacked [[Liskula Cohen]], a 37-year-old who had modeled for Australian Vogue, [[Georgio Armani]] and [[Versace]].<ref>{{cite web|url=http://www.wired.com/threatlevel/2009/08/blogger-unmasked/|title=‘Skanks’ Blogger Unmasked by Google Vows to Sue Company|author=Kim Zetter|publisher=[[Wird magazine]]|date=August 24, 2009|accessdate=2012-06-02}}</ref>
*'''Google Analytics & Reverse ID Lookup:''' [[Google Analytics|Google Analytics (GA)]] is used by many bloggers to keep track of the stats of their blogs. But GA is now threatening most bloggers through its Reverse ID Lookup tool which allow tracking what other sites or blogs the blogger maintains. Normally bloggers use the same Google ID to track their page views for every blog or site they maintain. With GA it is only a matter of minutes when a lot of information about the anonymous blogger can be retrieved. In November 2011, technologist [[Andy Baio]] used GA to trackdown an anonymous flamethrower to his self-identified blog in under a minute.<ref>{{cite web|url=http://www.wired.com/epicenter/2011/11/goog-analytics-anony-bloggers/all/1|title=Think You Can Hide, Anonymous Blogger? Two Words: Google Analytics|author=[[Andy Baio]]|publisher=[[Wired magazine]]|date=November 15, 2011|accessdate=2012-06-02}}</ref> Reverse lookups are now being offered by many free analytics services as well which can unmask a lot of blog’s IP addresses and domain registrations.
*'''Google Analytics & Reverse ID Lookup:''' [[Google Analytics|Google Analytics (GA)]] is used by many bloggers to keep track of the stats of their blogs. But GA is now threatening most bloggers through its Reverse ID Lookup tool which allow tracking what other sites or blogs the blogger maintains. Normally bloggers use the same Google ID to track their page views for every blog or site they maintain. With GA it is only a matter of minutes when a lot of information about the anonymous blogger can be retrieved. In November 2011, technologist [[Andy Baio]] used GA to trackdown an anonymous flamethrower to his self-identified blog in under a minute.<ref>{{cite web|url=http://www.wired.com/epicenter/2011/11/goog-analytics-anony-bloggers/all/1|title=Think You Can Hide, Anonymous Blogger? Two Words: Google Analytics|author=[[Andy Baio]]|publisher=[[Wired magazine]]|date=November 15, 2011|accessdate=2012-06-02}}</ref> Reverse lookups are now being offered by many free analytics services as well which can unmask a lot of blog’s IP addresses and domain registrations.



Revision as of 16:02, 2 June 2012

Anonymous Blogging is an electronic form of annonymous blogging.

Anonymous blogging in contrast to the conventional blogging practice is all about expressing thoughts and opinions without revealing one’s identity. Unlike fake blog, anonymous blogs are written by real people on factual stand points, and hence most are seen as a credible source, even though they may be biased. The purpose of the anonymous blog is to give an insiders view on a view point, situation, location or organisation, without giving away the identity of the writer.

Thanks to their insider authenticity and transparency, which are important in social networking and blogging, unlike fake blogs anonymous blogs are not illegal in most countries,[1] but the blog contents are still subject to at least the bloggers own resdient country laws, if not other jurisdictions.

Anonymous bloggers begin by setting up fake email addresses for their blog and registering it with a made-up name (pseudonym), just one way to hide the bloggers true identity. But since the reasons of anonymous blogging touched the notion of controversies, anonymous blogging has been facing a lot of technical challenges. Tracing identities is possible through a number of ways and anonymous bloggers are continuously finding new ways to protect the identities. Presently it is not only about choosing a pen name to start a blog, anonymous bloggers have to use a lot of ways to prevent their IPs to be traced.

Background

Blogging started off as a platform that allowed people to share ideas and opinions with the world. As a result bloggers also got to be famous as the traffic and visibility of their blogs increases with time. This traffic phenomenon lead in 2004 to the creation of John Gabriel's Greater Internet Fuckwad Theory:[2]

Normal Person + Anonimity + Audience = Fuckwad!

As the concept of blogging grew with time so did the reasons and disciplines of blogging. After threats were made to blogger Kathy Sierra, Tim O'Reilly called for the creation of the Blogger's Code of Conduct.[3] The idea of the code was first reported by BBC News, who quoted O'Reilly saying, "I do think we need some code of conduct around what is acceptable behaviour, I would hope that it doesn't come through any kind of regulation it would come through self-regulation."[4] In 2005, O'Reilly, Robert Scoble[5] and others came up with a list of seven proposed ideas.[6][7][8][9][10]

However, many authentic bloggers did not want people to know who they are and what they are doing, either because they are too shy or they want to pursue safe ways of blogging. One of the more popular reasons why bloggers choose to be anonymous is because the topic they want to discuss and share their opinions on is of a controversial nature and they want their identities to be hidden. Being part of the blogosphere throws a lot of questions at anonymous bloggers regarding their purpose of blogging but the truth is that the purpose of blogging is now evolving and anonymous blogging is one of the ways to have control over identity protection.

Benefits of Anonymous Blogging

The concept of anonymous blogging is an attraction for a lot of people. People choose to blog for a number of reasons in which lies the benefits of anonymous blogging. The idea to go anonymous can be supported by a number of reasons. It is simply a safe way of communicating with the blog community without fearing what others might think and say. Whatever the topic of the blog, bloggers benefit greatly from hiding their identities like:

  • Writing about whatever they want because they know nobody knows them and will not question them directly about what they wrote.
  • Getting a fresh start to blogging to know whether it will fail or succeed while protecting the true identity
  • Separating the blogging and personal life to let a different side out
  • Maintaining a number of different unrelated blogs showing different sides of their personalities
  • Getting opinions about the problems they are facing in life without letting people know who they actually are
  • Sharing a secret that they are too shy to let out if they are known by their readers
  • Not censoring anything in their writing for which their friends and acquaintances will haunt them about
  • Not having to worry about the judgments people can put on the beliefs and opinions of a blogger
  • Sharing controversies and scandals that might be going on in their workplace or some sensitive area that they know of
  • No pressure of worrying about being questioned, disagreed with or made fun of
  • Being able to use anonymous blogging for making money like writing review about certain products or pursuing affiliate marketing

Anonymous blogging has been an enchanting and inviting concept for many people who want to adopt blogging as part of their life. The only problem that bloggers are now facing with this concept is being able to protect their identities and getting through the web technicalities that allow a lot of ways to track users.

Types of anonymous blogs

Much as a blog can be on any subject, any anonymous blog can be on any subject. But most fall into the following major categories:

  • Political:
  • Revolutionary:
  • Reporter:
  • Company insider:

How Your Online Identity is Tracked

According to many blog experts bloggers cannot have full anonymity because the world of internet can allow knowing someone better than they know themselves in many ways. While surfing through the web a lot of personal information is left on the virtual space that can be accessed without permission and even available for the public to search. Browsers, search engines and social networking sites (like Facebook, Twitter, LinkedIn and MySpace) are the prime sources through which the personal information can be retrieved. However there are tools that pose threat to anonymous blogger’s identity that are used for tracking. This includes the following:

  • Cookies: Cookies are small pieces of data sent from a website and stored in a user's web browser while a user is browsing a website. When the user browses the same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the user's previous activity.[11] Cookies were designed to be a reliable mechanism for websites to remember the state of the website or activity the user had taken in the past. This can include clicking particular buttons, logging in, or a record of which pages were visited by the user even months or years ago. Although cookies cannot carry viruses, and cannot install malware on the host computer;[12] tracking cookies and especially third-party tracking cookies are commonly used as way to compile long-term records of individuals' browsing histories. In itself a major privacy concern that has prompted European and US law makers to take action,[13][14] cookies can be revealed to find out a blogger’s identity if not disabled.
  • IP Addresses: an Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[15] An IP address serves two principal functions: host or network interface identification; and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[16] IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6). Due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995,[17] standardized as RFC 2460 in 1998,[18] and its deployment has been ongoing since the mid-2000s. The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities. They hence fully revealing location of the device, making IP addresses are one of the most popular ways to track and reveal identities as well as physical location. Anonymous bloggers need to take help from a lot of tools to hide their IP addresses from being tracked easily. Typical of the attitude of internet companies, Google will only reveal an IP address identity on being served a valid court order, as they did in 2007 when the anonymous Skanks in NYC blog attacked Liskula Cohen, a 37-year-old who had modeled for Australian Vogue, Georgio Armani and Versace.[19]
  • Google Analytics & Reverse ID Lookup: Google Analytics (GA) is used by many bloggers to keep track of the stats of their blogs. But GA is now threatening most bloggers through its Reverse ID Lookup tool which allow tracking what other sites or blogs the blogger maintains. Normally bloggers use the same Google ID to track their page views for every blog or site they maintain. With GA it is only a matter of minutes when a lot of information about the anonymous blogger can be retrieved. In November 2011, technologist Andy Baio used GA to trackdown an anonymous flamethrower to his self-identified blog in under a minute.[20] Reverse lookups are now being offered by many free analytics services as well which can unmask a lot of blog’s IP addresses and domain registrations.

Technical Challenges Faced by Anonymous Bloggers

Mostly identities are revealed because bloggers are not very technically upfront. Anonymous blogging is not restricted to just having unreal names and emails anymore. There are a lot of aspects to consider in order to protect identities from being leaked through any source. For anonymous bloggers to remain totally and genuinely anonymous they must be totally invisible which is impossible. The biggest challenge that anonymous bloggers face is how to create delays in tracking them.

Bloggers have to ensure that there is no direct link to their real identity and the blog they maintain via the sources or tools that they are using to connect to the World Wide Web. This is specially important for the new bloggers who are not familiar with the breaking-in mechanisms of the virtual world. As the technology is evolving the browsers and connections used by users allow a lot of ways to protect privacy. But along with this evolution there are lot of consequences that hinder the conventional use of the web.

Logging in from different IP addresses whenever it is time to post something on the blog is one way of making bloggers invisible. The concept of Onion Routing has gained much publicity being used by Wikileaks to publish government secrets. While this may seem a fruitful idea it also slows down the routing process and at times restricts user from viewing certain web pages. Mainly all the techniques used to protect identities relate to hiding the IP address tracking. The browsers being used are equipped with major security holes that can comprise the online identity security of the bloggers.

Techniques to Stay Anonymous Online

Where there may not be a 100% guarantee on the idea of never being discovered, there are number of ways to pursue anonymity. A few steps surely do provide piece of mind from uninvited interference for anonymous bloggers and protecting their identities:

  1. It is important to set up a separate account for every blog maintained
  2. Using a separate email address to register the blog is important. It is also considered a good option to use temporary email addresses for posting to the blog. These emails expire after 24 hours
  3. Anonymous blogging platforms are the most viable options to consider for staying anonymous online
  4. Making sure that privacy settings are applied on the browser and also through the internet service provider to protect the IP address from being tracked
  5. Using the incognito mode on the browser can help maintain firewalls and proxy servers and also deletes the browsing history by disabling cookies
  6. Using a different host for the anonymous blog so that the IP assigned is totally separate from the one being used for real identity
  7. For tools like Google Analytics it is better to have a separate account to track different domains being maintained and much better to avoid such tools totally that are used to store identities
  8. Domain privacy must be ensured as identities can be revealed through domain payments being made online. It is a better idea to use either a free hosting service or pre-paid hosting service in which online payments can be avoided
  9. Installing Onion Routing software for not being able to track easily is essential as it helps in routing web requests through different network tunnels
  10. Avoid used social networking controls in the blog sites like Facebook or Twitter or even the RSS feed.

An Anonymous blogging platforms

As anonymous blogging is on an upsurge various platforms are being introduced that offer protection of identities for the bloggers. Anonyme.com is one such anonymous blogging platform that is catering to this particular need of bloggers. The platform provides guarantee in the privacy and safety of bloggers and their blog post through a safe environment of blogging.

The technique used by Anonyme is encryption to block the tracking of IP addresses. The servers are encrypted which makes it impossible for the outside interferers to intrude into the privacy of bloggers. Bloggers can create accounts at Anonyme without sharing any of their personal information or even email addresses. This is one way of staying purely anonymous and puts the blogger in charge of what to reveal and what to hide. This does not restrict the readers of the blog to post comments on the blog posts. The two way communication between the anonymous blogger and the reader is constant and bloggers can even use their mobile devices to send posts without their IPs getting tracked.

As new ways of staying anonymous are being introduced such anonymous blogging platforms offer a convenient way to communicate specially for new bloggers. Those who are not technology savvy can leverage significantly through platforms like Anonyme.com because there are no technical details involved. Users simply create their anonymous account and start blogging. The platform provides identity security on its own without letting the user worry about how to apply different measures of protection. Anonyme is a considerable option for anonymous bloggers wanting to blog for their own reasons.

See also

References

  1. ^ Chartered Institute of Public Relations (2009) CIPR Social Media Guidelines (updated January 2009), p.4 - available at http://www.cipr.co.uk/sites/default/files/Social%20Media%20Guidelines.pdf - accessed 09 August 2010.
  2. ^ "John Gabriel's Greater Internet Fuckwad Theory". penny-arcade.com. Retrieved 2012-06-02.
  3. ^ Tim O'Reilly (2007-03-03). "Call for a Blogger's Code of Conduct". O'Reilly Radar. Retrieved 2007-04-14.
  4. ^ "Call for blogging code of conduct". BBC News. 2007-03-28. Retrieved 2007-04-14.
  5. ^ "Blog death threats spark debate publisher", BBC News, March 27, 2007.
  6. ^ "Draft Blogger's Code of Conduct". Radar.oreilly.com. Retrieved 2011-01-30.
  7. ^ "Blogger's Code of Conduct at Blogging Wikia". Blogging.wikia.com. Retrieved 2011-01-30.
  8. ^ "MilBlogs Rules of Engagement". Yankeesailor.us. 2005-05-20. Retrieved 2011-01-30.
  9. ^ Code of Conduct: Lessons Learned So Far, by Tim O'Reilly
  10. ^ "Blogger Content Policy". Blogger.com. Retrieved 2011-01-30.
  11. ^ "HTTP State Management Mechanism – Overview". IETF. 2011-04. {{cite web}}: Check date values in: |date= (help)
  12. ^ Adam Penenberg. Cookie Monsters. Slate, November 7, 2005. "Cookies are not software. They can't be programmed, can't carry viruses, and can't unleash malware to go wilding through your hard drive."
  13. ^ "New net rules set to make cookies crumble". BBC. 2011-03-08.
  14. ^ "Sen. Rockefeller: Get Ready for a Real Do-Not-Track Bill for Online Advertising". Adage.com. 2011-05-06.
  15. ^ RFC 760, DOD Standard Internet Protocol (January 1980)
  16. ^ RFC 791, Internet Protocol - DARPA Internet Program Protocol Specification (September 1981)
  17. ^ RFC 1883, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden (December 1995)
  18. ^ RFC 2460, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden, The Internet Society (December 1998)
  19. ^ Kim Zetter (August 24, 2009). "'Skanks' Blogger Unmasked by Google Vows to Sue Company". Wird magazine. Retrieved 2012-06-02.
  20. ^ Andy Baio (November 15, 2011). "Think You Can Hide, Anonymous Blogger? Two Words: Google Analytics". Wired magazine. Retrieved 2012-06-02.

External links