FINDING · DEFENSE
Pseudonymity uses persistent identifiers other than real names, enabling accountability while providing partial unlinkability; however, use of the same pseudonym across different contexts enables linkability: the attacker can link all data related to a pseudonym. Unlinkability of two messages requires that the attacker cannot sufficiently distinguish whether they share a sender or recipient; for a scenario with n senders, this holds iff the probability of common authorship is sufficiently close to 1/n.
From 2010-pfitzmann-terminology — A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management · §4, §9, §11 · 2010
Implications
- Long-lived connection identifiers (session tokens, TLS fingerprints, persistent client IDs) function as pseudonyms enabling cross-session linkability — rotate identifiers per connection and avoid reuse across contexts to prevent correlation attacks.
- Protocol designers must ensure that any stable observable attribute (port, timing signature, payload pattern) does not function as an implicit pseudonym; if the censor can link two sessions via a shared attribute, full unlinkability is lost regardless of encryption strength.
Tags
Extracted by claude-sonnet-4-6 — review before relying.