This document discusses methods for blacklisting and blocking anonymous credential users who misbehave. It proposes including a trustee entity that users trust in addition to the initiator, certification authority, and responder. The trustee would assign pseudonyms to users after verifying their credentials and request certificates from the certification authority on the users' behalf. The responder would monitor users' activities and blacklist any who misbehave by maintaining a table of blacklisted and whitelisted users. If a blacklisted user tries to renew their certificate, the certification authority would reject the request. The document also describes generating certificates using OpenSSL and the SHA-1 and RSA algorithms.