
Can PETs Contain the Risk of Third-Party Data Sharing?
Jul 11, 2025
This week, we look at how third-party access spreads privacy risk—and what it takes to lock it down across systems.
One Research Paper
How much tracking power do third-party data collectors actually have? This study introduces a new metric based on how frequently trackers appear across popular websites and apps, revealing how a small number of companies dominate online tracking.
One YouTube Video
What can a data broker really know about you? In this talk, data scientist Andreas Dewes shows how he obtained the browsing history of 3 million German citizens—and how easily it could be de-anonymised. A powerful case study in just how far third-party data collection can go.
One Article
A single misconfig exposed user data across 720 apps. In this article, a security researcher uncovers how a no-code app platform’s privacy flaw led to widespread PII leaks. His step-by-step breakdown highlights how third-party platforms can quietly propagate risk.
One Chapter
We’ve seen the problems—here’s a solution. This chapter introduces how smaller orgs and public agencies can start using differential privacy tools to release useful data while safeguarding individuals—even against future attacks or unknown auxiliary info.

