Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 The 3rd IEEE Intl. Workshop on Mobile Data Management, Mining and Computing.

Slides:



Advertisements
Similar presentations
Google Series Part 1: gmail Part 2: maps Part 3: talk Part 4: earth Part 5: books Part 6: picasa Part 7: sites Part x: ?
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Using the Self Service BMC Helpdesk
Social Media.
Welcome to Mobile TEL A questionnaire will follow this presentation for you to evaluate the application.
Mentee Training. Session Outline Section One: Introduction: why ementoring, who’s who, your expectations Great Expectations Keeping safe Good message,
Cyber bullying and internet safety Parents meeting: staying safe online.
Ask.fm is an app anyone can post anonymous questions and comments and has been used to send sexual, cyberbullying and other abusive content.
Green Computing Energy in Location-Based Mobile Value-Added Services Maziar Goudarzi.
Bully Free Freshman Class Session 2
Developing the Facebook Application for the Penn State University Libraries Developing the Penn State University Libraries Application for Facebook.
Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 NSF Workshop on Sustainable Energy Efficient Data Management (SEEDM), Arlington,
Technology in Education Richard Anderson Department of Computer Science and Engineering University of Washington Seattle, Washington, USA March 28, 2006.
Classroom Presenter: Supporting Active Learning with the Tablet PC Richard Anderson University of Washington March 19, 2007 Asia-Pacific Regional Workshop.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
ICT E-SAFETY ARCHIBALD FIRST SCHOOL. ICT Mark Only the 2 nd school in Newcastle LA to achieve the award: October 2009 Only the 2 nd school in Newcastle.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Net Cetera Chatting with Kids About Being Online.
CHUCK YOUNG MANAGING DIRECTOR OFFICE OF PUBLIC AFFAIRS GOVERNMENT ACCOUNTABILITY OFFICE to AGA BOSTON CHAPTER PROFESSIONAL DEVELOPMENT CONFERENCE MARCH.
Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/ th IEEE International Conference on Mobile Data Management (MDM’11), June.
Rayzit EPL 371 Aζίζ Φίλιππος Παπαϊωάννου Βαρνάβας Πασχαλίδης Δημήτρης Χαραλάμπους Θεόδωρος.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Suggesting Friends using the Implicit Social Graph Maayan Roth et al. (Google, Inc., Israel R&D Center) KDD’10 Hyewon Lim 1 Oct 2014.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
23 Participants Average years in education = Average age = males; 14 females Most used applications = Events; Social Networks; Music Least.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Why I LIKE the Facebook Database… Sharon Viente May 2010.
Wireless Networks Breakout Session Summary September 21, 2012.
Rage Reaction: What do you know about cyber-bullying?
Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 MDM 2012 © Chatzimilioudis, Zeinalipour-Yazti, Lee, Dikaiakos 1 “Continuous.
 Social and Technological developments that led to Web 2.0 Internet connectivity available almost everywhere Personal computer evolved into homes, schools,
How far removed are you? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL Marcin Nagy joint work with Thanh Bui, Emiliano De.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
The Birth & Growth of Web 2.0 COM 415-Fall II Ashley Velasco (Prince)
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Top 15 Online Tools Cliff Hutto Columbus State University.
Social Media Safety Presented by: Jenny Anderson-Flynn Michael Ham Melissa Romell Deepthi Suvarna University of Houston Clear Lake Masters of Education.
Enhancing e-learning experience with online social networks Published in IET Communications J.J.P.C. Rodrigues, F.M.R. Sabino, L. Zhou Reporter: Yu Chih.
Defining Social Media Social Media Marketing Communications Digital Marketing Characteristics Types of Internet Advertising Mobile Marketing Social Behavior.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
E-safety a whole community approach © Childnet International 2007 E-Safety – A Whole Community Approach Internet safety in secondary school MaryLouise.
ONLINE COMMUNICATION JAZ PATERNOSTER. SOCIAL NETWORKING A social network is a website which enables communication between friends and family through a.
Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 1/17 ERCIM Spring Meeting 2013, June 6, 2013, Nicosia,
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Social Media Safety Presented by: Fayzeh Madani Coffee with the Principal 2/11/15 Created By University of Houston Clear Lake Anderson-Flynn, J., Ham,
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology Tips and Safety for Parents and Teens.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
SARAH FRYE CEO Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just for communication purpose.
What’s Trending at EMS March 16, 2016 Emily Lager Sixth Grade School Counselor Michelle Ebert Teen Talk Counselor.
Social Media Safety. Discuss O As a class discuss the different types of social media and what it is used for.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
S SPATE: Compacting and Exploring Telco Big Data Constantinos Costa1 , Georgios Chatzimilioudis1, Demetris Zeinalipour-Yazti2,1, Mohamed F. Mokbel3.
Distributed In-Memory Processing of All k Nearest Neighbor Queries G
Digital Citizenship and Social Media
Digital Citizenship Tech in TUSD.
What it is, how to spot it, and how to respond to it
Social Media Safety.
E-safety Presentation
Presentation transcript:

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 The 3rd IEEE Intl. Workshop on Mobile Data Management, Mining and Computing on Social Networks, with IEEE MDM '15, June 15, 2015, Pittsburgh, PA, USA Rayzit: An Anonymous and Dynamic Social Network Architecture Constantinos Costa, Chrysovalantis Anastasiou, Georgios Chatzimilioudis and Demetrios Zeinalipour-Yazti Data Management Systems Laboratory Dept of Computer Science, University of Cyprus

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 2 Microblogging Microblogs are small elements of content such as short text, images, video. –Microblogging apps have played an important role in online socializing throughout the years. Microblogging services are backed by an explicit (FB) or implicit (MSN) Social Graph. –Friends, Followers, SMS Contact list, Addressbook. UNIX talk ‘80‘90‘70 ‘00‘10‘15 IRC ‘88 MSN ‘99 Skype ‘03 ChatMessaging Facebook ‘04 Twitter ‘06 Social Foursquare ‘08 LocationForget Snapchat ‘11 Anon. LBS Rayzit ‘13 SMS

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 3 Chat is so popular that we will use it everywhere, e.g., smart-homes, mobile payments (order a pizza, pay for a coffee), etc. Microblogging Snapcash LG Viber allows sending paid stickers:

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 4 Problem 1: Lack of Proximity Current Microblogging apps are unable to realize proximity-based applications, e.g., for: –V2V communication scenarios. –Adhoc events. –Emergency response scenarios. Crowd around is not in your Social graph 

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 5 Problem 2: Location Privacy LB apps can continuously “know” (surveil, track or monitor) the location of a user while serving them. –Which Location settings to keep on? “Please rob me” awareness project shows the impact of location release. –Shows when users check-in somewhere that is not their home (Foursquare location updates).

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 6 Problem 3: Boostrapping LB apps suffer from bootstrapping issues –“Bootstrapping refers to the starting of a self- sustaining community that is supposed to proceed without external input” wikipedia Most LB apps don’t have enough users online upfront. This gives the impression to new users that the app is deserted. Consequently, many people don’t use it and the app gradually dies.

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 7 Problem 4: Cyberbulling Social Identities* and (LB) chat apps encourage the usage of cyberbullying and retaliation. –“Cyberbullying is the use of social networks to repeatedly harm or harass other people in a deliberate manner.” wikipedia –Cyberbullying Examples: “communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient.” wikipedia Social networks deploy community operation teams that attempt to correct and resolve disputes. –Won’t scale adequately. –Might be unfair * Whispers in the dark: analysis of an anonymous social network, Wang et. al., UC Santa Barbara, in ACM IMC 2014.

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 8 Presentation Outline Introduction The Rayzit Concept –The Application –AKNN Query Engine –Architecture Data Analysis and Evaluation Conclusion

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 9 Rayzit Concept Rayzit is a crowd messaging technology that delivers questions, inquiries and ideas to the KNN users. –Not location-based app (e.g., 5 km) but kNN-based! –Addresses: Proximity, Privacy, Bootstrapping and Cyberbullying Rayzit was funded by the Appcampus Program (Microsoft, Nokia & Aalto, Finland). –Ranked among 5 best apps of the program from 3500 apps. –Few thousand downloads and active users after their marketing!

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 10 Rayzit User Map Crowd Micro-blogging

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 11 The Rayzit Application Rayzit opens with a livefeed of messages from kNN neighbors (no login required / R17+) A user can then: Star Rayz (continue to follow after leaving a neighborhood) Re Rayz (sent at new location) Remove Rayz (Hide It) Power + or – (help future filters) Report Rayz (automated community management technique: >3 reports and >30% of responses deletes rayz)

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 12 The Rayzit Application A user can post a new Rayz (text, audio, video – shown as attachment). To minimize spamming, each user has a powerbar that decreases on every action: Rayz, reply, re-rayz, power+/- When empty no more actions are possible until it gradually reloads. To reload faster, we provide the incentive to provide useful answers that will be starred by others. A message can be bounded to a certain distance (kNN is default) 0.5, 5, 50, 500, 5000 km

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 13 Example Conversations General Advice & Crowd Casting

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 14 Example Conversations Philosophical & Location-based Questions

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 15 Example Conversations Feelings Expression & Taboo Questions

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 16 Example Conversations Inappropriate Messages (before installation of report filter)

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 17 More Topics on Rayzit Topics: Location, Surveys, Thoughs, Feelings Most answered rayz (responses) –“Rain! Lovely.” (228) –“Any good PGs near Avanshi RoadCBE?” (142) –“Which windows phone do you have?” (119) –“anyone around..???” (94) –“Share a secret..” (90) –“Rayzit: What is the next feature you would like to see?” (81) –“I love.... (continue)” (58) –“Where are you from? I want to test Rayzit location.” (52) –“Where to dine in Coimbatore if you want to have a dinner peacefully and by yourself?” (40)

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 18 Presentation Outline Introduction The Rayzit Concept –The Application –AKNN Query Engine –Architecture Analyzing the Rayzit Network Conclusion

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 19 K Nearest Neighbor Networks Find 2 Closest Neighbors for ALL User "Continuous all k-nearest neighbor querying in smartphone networks", Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti, Wang-Chien Lee, Marios D. Dikaiakos, In IEEE MDM'12.

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 20 Distibuted AkNN Computation “Distributed In-Memory Processing of All k Nearest Neighbor Queries, Georgios Chatzimilioudis, Costantinos Costa, Demetrios Zeinalipour-Yazti, Wang-Chien Lee, Evaggelia Pitoura, under evaluation. Rayzit has been designed with the research hypothesis of million-kNN computations every few seconds. Computing kNN for each O locally. Wrong Result 

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 21 Urban Social (Crowd) Networks Spitfire Execution Phases –Partition problem space (each cell at least k) –Replicate border cases minimally. –Perform local AkNN computation Distributed Algorithm implemented in MPI

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 22 Presentation Outline Introduction The Rayzit Concept –The Application –AKNN Query Engine –Architecture Analyzing the Rayzit Network Conclusion

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 23 The Rayzit Architecture

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 24 The Rayzit Architecture Web 2.0 API has helped to build a modular architecture –Helped for building clients by different groups of people

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 25 The Rayzit Architecture Example Web App build by undergrad team:

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 26 Presentation Outline Introduction The Rayzit Concept –The Application –AKNN Query Engine –Architecture Analyzing the Rayzit Network Conclusion

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 27 Analyzing the Rayzit Network We used both Flurry App Analytics and Analytic queries on our NoSQL database Interval of Analysis: Oct. 13 – Mar. 15 –32,762 Sessions –5,062 New Users –1.7 mins Median Session Length Conclusion: –App more popular in Asia, India particularly because of large Microsoft community and Microsoft Promotion)

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 28 Session Duration 80% of sessions is between 30 sec. to 10 min.  Users find the Rayzit Experience interesting  Requirement: kNN graph must be recomputed quickly

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 29 Average Reply Time 28% 28% of replies were recorded within 1 minute.  Crowd Volume creates quick response possibilities  Nearby users respond quickly (more interested in the discussion). Online users Offline users Sporadic users Rest

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 30 Average and Maximum Distance (Rayz, Reply) Hypothesis: Closer Geographic Users means More Replies People in classroom, event? distance of rayz to replies ([1-50] replies) = 15km (max) >50 replies At 10km (max) >100 replies at 8 meters!

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 31 Future Challenges Tools to handle lack of accountability that has shown to encourage negative discourse, including personal attacks, threats or rumor spreading [IMC’14] Introduce more automated and crowd management techniques (collaborative filtering): –More intelligent Report Management –Classify rayz threads to categories –More detailed data analysis (interaction graphs, rerayz path length, community detection, chat groups vs. location, new vs. old users, …. –Comparison with other similar networks

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 The 3rd IEEE Intl. Workshop on Mobile Data Management, Mining, and Computing on Social Networks, with IEEE MDM '15, June 15, 2015, Pittsburgh, PA, USA Rayzit: An Anonymous and Dynamic Social Network Architecture Thanks! Questions? Contact:

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 33 Summary of Microblogging Apps Identity Chat LB Anonymous Chat LB Identity Chat

Dagstuhl Seminar 10042, Demetris Zeinalipour, University of Cyprus, 26/1/2010 Costa, Anastasiou, Chatzimilioudis and Zeinalipour-Yazti, Mobisocial IEEE MDM’15, Pittsburgh, PA, USA 34 Related Work ApplicationDistancekNNAnonymousLocation FacebookNo Yes TwitterNo Yes FoursquareYesNo Yes SnapchatNo Yes SecretNo PartialYes Yik Yak10 milesNoYes WhisperNo PartialYes RayzitCustomYes Identities Anonymous