Reidentification Example
Learn how attackers can reidentify using leaked data.
To better illustrate how dangerous reidentification is, we examine a relevant example in the financial context. We’ll take the recent Experian data breaches as inspiration.
Setup
Imagine we have three datasets—the Netflix ratings dataset (made public for research/competitions), the IMDb ratings dataset (always public), and credit data from Experian (obtained and released through a major data ...