Privacy Attacks

What Are Re-identification Attacks and How Do They Work?

Re-identification attacks reverse the anonymisation process by linking de-identified data back to the individual it pertains to. Even if a dataset appears anonymised, auxiliary information (such as voter registration lists) can often be used to re-identify individuals. These attacks exploit the richness of the dataset, where more detailed data increases the chances of re-identification.

Read more about it

Drive the future of data privacy.

Drive the future of data privacy.

Want to check out more of our privacy insights?

Want to check out more of our privacy insights?

Find out more about how we implement privacy solutions.

Find out more about how we implement privacy solutions.