FINDING · DEFENSE

Pseudonymity uses persistent identifiers other than real names, enabling accountability while providing partial unlinkability; however, use of the same pseudonym across different contexts enables linkability: the attacker can link all data related to a pseudonym. Unlinkability of two messages requires that the attacker cannot sufficiently distinguish whether they share a sender or recipient; for a scenario with n senders, this holds iff the probability of common authorship is sufficiently close to 1/n.

From 2010-pfitzmann-terminologyA terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management · §4, §9, §11 · 2010

Implications

Tags

techniques
dpiflow-correlation
defenses
pluggable-transporttorbridges

Extracted by claude-sonnet-4-6 — review before relying.