Read on to uncover the deeply troubling insights from Dewes' talk, including how seemingly harmless browsing data can be used to track individuals, the growing role of AI in data harvesting, and the urgent need for stronger regulations to protect privacy rights today.
Setting the Scene
In 2016, Dewes partnered with investigative journalist Svea Eckart to conduct an interesting experiment: they created a fake marketing company, complete with a website, a LinkedIn page, a fictitious CEO, and even a careers page. Their goal was to infiltrate the world of data brokerage and acquire personal user data, which they would analyse to test its level of "anonymisation."
After months of negotiations, the ruse paid off. Dewes and Eckart were granted access to a staggering dataset containing 3 billion URLs from 3 million German users over a two-month period. The dataset was advertised as anonymised, but it didn’t take long for the researchers to dismantle it.
They uncovered the complete browsing history of individuals, tracing every click, every hour, every website—from banking and shopping to private emails and Google Translate queries.
This discovery exemplified just how flawed anonymisation methods were. Dewes compared the process to someone showing up at your door with a detailed log of everything you’ve done online for the past month—not obtained through sophisticated hacking, but simply purchased from a data broker.
De-Anonymisation in a Nutshell
Dewes' talk centred around the startlingly simple process of de-anonymisation. He demonstrated that even without direct identifiers (like names or email addresses), each user’s unique digital footprint—comprising specific websites visited, social media accounts, and other habits—could easily be matched to public information, revealing their identity.
One of the most startling examples was how Google Translate revealed entire email texts within URLs. In one case, a German cybercrime investigator’s translation requests for foreign police assistance appeared in the dataset, exposing sensitive information about ongoing investigations. This vulnerability illustrated just how easily personal and professional data could be revealed through common, everyday online activities.
Andreas further explained how even seemingly innocuous data points, such as YouTube video IDs or Google Maps location data (e.g., home or work addresses), could be used to identify users. In fact, it often takes as few as three data points to uniquely identify a person.
This is because the digital traces people leave behind while browsing—be it favourite news sites, social media logins, or bank websites—are surprisingly distinctive, making complete anonymisation nearly impossible.