Pseudonymity is insufficient for dissent networks: social-network profile information can be correlated with external data to deanonymize users, and fixed-infrastructure networks enable localization attacks even without explicit identity. The authors argue that true anonymity—or at minimum strong deniability where usage is non-incriminating and activity is difficult to trace—is required to protect participants.
From 2013-hasan-building — Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
· §5.2
· 2013
· Free and Open Communications on the Internet
Implications
Design circumvention tools so that the act of using them is indistinguishable from legitimate activity (cover traffic, dual-use applications), not merely that user identity is pseudonymous.
Avoid network architectures that produce persistent interaction records linkable to physical location; prefer decentralized topologies that make traffic analysis difficult.