How to Build Internet Privacy with Pseudonyms