{"id":4914,"date":"2020-05-06T06:47:59","date_gmt":"2020-05-06T06:47:59","guid":{"rendered":"http:\/\/wiki.davelevy.info\/?p=4914"},"modified":"2021-12-05T11:56:27","modified_gmt":"2021-12-05T11:56:27","slug":"33-bits","status":"publish","type":"post","link":"https:\/\/davelevy.info\/wiki\/33-bits\/","title":{"rendered":"33 bits"},"content":{"rendered":"<p>I have just <a href=\"https:\/\/www.linkedin.com\/pulse\/anonymisation-pseudonymisation-encryption-david-levy-1f\/\">posted a piece on protective technologies and their impact on data protection compliance<\/a>; I mentioned the 33 bit identifying threshold for a successful jigsaw attack and found that my notes on this were missing. So I made this. &#8230;<!--more--><\/p>\n<h3>Links<\/h3>\n<ol>\n<li><a href=\"https:\/\/www.eff.org\/deeplinks\/2010\/01\/primer-information-theory-and-privacy\">https:\/\/www.eff.org\/deeplinks\/2010\/01\/primer-information-theory-and-privacy<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Entropy_(information_theory)\">https:\/\/en.wikipedia.org\/wiki\/Entropy_(information_theory)<\/a><\/li>\n<li><a href=\"https:\/\/33bits.wordpress.com\/about\/\">https:\/\/33bits.wordpress.com\/about\/<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/science\/2014\/jun\/22\/shannon-information-theory\">https:\/\/www.theguardian.com\/science\/2014\/jun\/22\/shannon-information-theory<\/a><\/li>\n<li><a href=\"http:\/\/people.math.harvard.edu\/~ctm\/home\/text\/others\/shannon\/entropy\/entropy.pdf\">http:\/\/people.math.harvard.edu\/~ctm\/home\/text\/others\/shannon\/entropy\/entropy.pdf<\/a><\/li>\n<li>https:\/\/en.wikipedia.org\/wiki\/K-anonymity#cite_note-1<\/li>\n<li><a href=\"https:\/\/epic.org\/wp-content\/uploads\/privacy\/reidentification\/Sweeney_Article.pdf\"><em>k<\/em>-anonymity: A model for protecting privacy<\/a> by Latanya Sweeny about a provable k-anonymity protection<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>I have just posted a piece on protective technologies and their impact on data protection compliance; I mentioned the 33 bit identifying threshold for a successful jigsaw attack and found that my notes on this were missing. So I made this. &#8230;<\/p>\n","protected":false},"author":1,"featured_media":4915,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_share_on_mastodon":"0"},"categories":[3],"tags":[1444,955,1445,1443,1706,911],"class_list":["post-4914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-33-bits","tag-data-protection","tag-entropy","tag-jigsaw-attack","tag-k-anonymity","tag-technology"],"share_on_mastodon":{"url":"","error":""},"jetpack_featured_media_url":"https:\/\/davelevy.info\/wiki\/wp-content\/uploads\/2020\/05\/Gabriel-Crismariu-jigsaw-w650-CC0.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/4914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/comments?post=4914"}],"version-history":[{"count":1,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/4914\/revisions"}],"predecessor-version":[{"id":6065,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/4914\/revisions\/6065"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media\/4915"}],"wp:attachment":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media?parent=4914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/categories?post=4914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/tags?post=4914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}