[Security] How anonymous is anonymous?

aestetix aestetix aestetix at gmail.com
Thu Sep 10 20:50:02 UTC 2009


Always an interesting security question.... Tor, OpenAMD<http://amd.hope.net>,
etc are all projects dancing around these ideas.

http://arstechnica.com/tech-policy/news/2009/09/your-secrets-live-online-in-databases-of-ruin.ars
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006

The latter is an interesting looking paper regarding reverse engineering
personal details out of large amounts of data.

Part of me wonders if this represents a data-mining version of the Index of
Coincidence <http://en.wikipedia.org/wiki/Index_of_coincidence> approach.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.noisebridge.net/pipermail/security/attachments/20090910/0d5fbc86/attachment-0002.html>


More information about the Security mailing list