I have just posted a piece on protective technologies and their impact on data protection compliance; I mentioned the 33 bit identifying threshold for a successful jigsaw attack and found that my notes on this were missing. So I made this. …

Links

  1. https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy
  2. https://en.wikipedia.org/wiki/Entropy_(information_theory)
  3. https://33bits.wordpress.com/about/
  4. https://www.theguardian.com/science/2014/jun/22/shannon-information-theory
  5. http://people.math.harvard.edu/~ctm/home/text/others/shannon/entropy/entropy.pdf
  6. https://en.wikipedia.org/wiki/K-anonymity#cite_note-1
  7. k-anonymity: A model for protecting privacy by Latanya Sweeny about a provable k-anonymity protection

One Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.