FAQs
Privacy Attacks
How Do Reconstruction Attacks Compromise Privacy?
FAQs
Privacy Attacks
How Do Reconstruction Attacks Compromise Privacy?

Reconstruction attacks aim to infer sensitive information about individuals in a dataset by using statistical outputs provided by the dataset's curator. For example, if a dataset includes anonymous health information, an attacker might use statistical analysis to deduce the health status of specific individuals. These attacks use methods like solving sets of linear queries about the dataset, where the accuracy of these queries can lead to almost complete reconstruction of the private data.

Drive the future of data privacy.

Attend the EODSummit

Want to check out more of our privacy insights?

Read the blog

Find out more about how we implement privacy solutions.

Learn about Oblivious

2024 Oblivious Software Ltd. All rights reserved.