FAQs
Privacy Attacks
What Are Re-identification Attacks and How Do They Work?
Re-identification attacks reverse the anonymisation process by linking de-identified data back to the individual it pertains to. Even if a dataset appears anonymised, auxiliary information (such as voter registration lists) can often be used to re-identify individuals. These attacks exploit the richness of the dataset, where more detailed data increases the chances of re-identification.
Drive the future of data privacy.
Attend the EODSummit
Want to check out more of our privacy insights?
Read the blog
Find out more about how we implement privacy solutions.
Learn about Oblivious