Pseudonymity uses persistent identifiers other than real names, enabling accountability while providing partial unlinkability; however, use of the same pseudonym across different contexts enables linkability: the attacker can link all data related to a pseudonym. Unlinkability of two messages requires that the attacker cannot sufficiently distinguish whether they share a sender or recipient; for a scenario with n senders, this holds iff the probability of common authorship is sufficiently close to 1/n.
From 2010-pfitzmann-terminology — A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
· §4, §9, §11
· 2010
Implications
Long-lived connection identifiers (session tokens, TLS fingerprints, persistent client IDs) function as pseudonyms enabling cross-session linkability — rotate identifiers per connection and avoid reuse across contexts to prevent correlation attacks.
Protocol designers must ensure that any stable observable attribute (port, timing signature, payload pattern) does not function as an implicit pseudonym; if the censor can link two sessions via a shared attribute, full unlinkability is lost regardless of encryption strength.