Anonymity itself is hard to maintain. There are generally two ways to do so:<p>1) Accounts can be obtained at a network which is KNOWN not to discover who the owners are. These accounts can then be used to open other accounts at other organizations and networks in a sort of graph, and eventually double back on themselves once or twice.<p>2) For networks which do not allow anonymous accounts, nor allow the use of other "anonymity-friendly" networks to authenticate with or create accounts, one would have to use account hijacking. That is to say, use an existing account belonging to an existing member. This should be done carefully, as the member might have to face consequences for any actions you perform with their account, if they are discovered. It is advisable to know whether the organization has a provision for dropping proceedings against members whose accounts have been found to be "hacked".<p>Of course, with all this, you would still have to make sure repeated communication does not bear any fingerprints that could be used to identify you. For instance: the language you use, the time of day you post, the location you post from, the subject you post about, all those things must have a sufficient number of possible candidates so as to make actually confronting them in person (or e.g. tampering with their internet connection) infeasible or unattractive.<p>I figure since this is Hacker News, it is a good place to post this analysis.