A-Z Popular Blog Security Search »

What is Pseudonymity?

 , updated on
Pseudonymity is the use of an invented name in order to establish some degree of anonymity and privacy. It is a concept that has significant history behind it. In some cases, current laws and regulations don't permit a pseudonym to be used. For example, you generally can't use a pseudonym on a driver's license.

Digital Pseudonyms

Generally speaking, users who use a pseudonym online can often be identified by the service using factors such as their IP address or mobile phone number. However, the public may not have access to such information, allowing pseudonyms to enhance privacy in a meaningful way.

Cryptography & Pseudonyms

In areas such as cryptography, pseudonymity may be used as a privacy mechanism. For example, some types of digital certificates may allow individuals to use a pseudonym if it is declared as such. Technologies such as digital currency may also use pseudonymity techniques.
Overview: Pseudonymity
The use of an invented name and other identifying information such as a user name in order to establish some degree of anonymity.
Related Concepts


This is the complete list of articles we have written about privacy.
Big Brother
Creeping Normality
Cultural Lag
Data Liberation
Data Risks
Data Subject
Default Effect
Information Security
Media Literacy
Offline Software
Personal Data
Personal Information
Privacy By Design
Smart Cities
Social Data
Technology Ethics
If you enjoyed this page, please consider bookmarking Simplicable.

Privacy By Design

An overview of privacy by design.

Expectation Of Privacy

The definition of expectation of privacy.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.


The definition of delete with examples.

Privacy Examples

The definition of privacy with examples.

Data Backup

Several data backup techniques compared.

Sandbox Definition

An overview of sandboxes. An information security technique.

Strong Password

A few examples of what makes a password strong or weak.

Encryption Examples

A definition of encryption with examples.

Zero-day Vulnerability

An overview of zero-day vulnerability.


A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.


A definition of sandbox with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map