I have just posted a piece on protective technologies and their impact on data protection compliance; I mentioned the 33 bit identifying threshold for a successful jigsaw attack and found that my notes on this were missing. So I made this. …
Links
- https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy
- https://en.wikipedia.org/wiki/Entropy_(information_theory)
- https://33bits.wordpress.com/about/
- https://www.theguardian.com/science/2014/jun/22/shannon-information-theory
- http://people.math.harvard.edu/~ctm/home/text/others/shannon/entropy/entropy.pdf
- https://en.wikipedia.org/wiki/K-anonymity#cite_note-1
- k-anonymity: A model for protecting privacy by Latanya Sweeny about a provable k-anonymity protection
Today I added two links on K-Anonymity.