I have just posted a piece on protective technologies and their impact on data protection compliance; I mentioned the 33 bit identifying threshold for a successful jigsaw attack and found that my notes on this were missing. So I made this. …
Read more