Attacks on Applications of K-Anonymity — For the Rest of Us | by d0nut


A table before and after k-anonymity
Venn Diagram showing crude relationship between “All Words” and “Words beginning with HAC”
Hack
Hackberry
Hacked
Hacker
Hackers
Hacking
Hacksaw
...
Game 1: Hacker, Hackers
Game 2: Cracker, Crackers
Game 3: Cyberpunk





Source link