Privacy Attacks

What Are Re-identification Attacks and How Do They Work?

Re-identification attacks reverse the anonymisation process by linking de-identified data back to the individual it pertains to. Even if a dataset appears anonymised, auxiliary information (such as voter registration lists) can often be used to re-identify individuals. These attacks exploit the richness of the dataset, where more detailed data increases the chances of re-identification.

Read more about it

Drive the future of data privacy.

Want to check out more of our privacy insights?

Find out more about how we implement privacy solutions.