Privacy Attacks
What are Reidentification Attacks and How Do They Work?
Privacy Attacks
What Are Re-identification Attacks and How Do They Work?

Re-identification attacks reverse the anonymisation process by linking de-identified data back to the individual it pertains to. Even if a dataset appears anonymised, auxiliary information (such as voter registration lists) can often be used to re-identify individuals. These attacks exploit the richness of the dataset, where more detailed data increases the chances of re-identification.

Drive the future of data privacy.

Attend the EODSummit

Want to check out more of our privacy insights?

Read the blog

Find out more about how we implement privacy solutions.

Learn about Oblivious

2024 Oblivious Software Ltd. All rights reserved.