Privacy Attacks
What Are Re-identification Attacks and How Do They Work?
Re-identification attacks reverse the anonymisation process by linking de-identified data back to the individual it pertains to. Even if a dataset appears anonymised, auxiliary information (such as voter registration lists) can often be used to re-identify individuals. These attacks exploit the richness of the dataset, where more detailed data increases the chances of re-identification.