Difference between revisions of "Security notes / Anonymization notes"
From Helpful
(Created page with "{{SecurityRelated}} <!-- Say : you want to provide data to someone for some analytics. : You know that it has personally identifiable fields, like username, IP address, lic...") |
m |
||
Line 24: | Line 24: | ||
If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values. | If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values. | ||
− | This is a perfectly feasible attack for all the things just named - and so simple to you don't need any | + | This is a perfectly feasible attack for all the things just named - and so simple to you don't need any cryptographic knowledge. |
Latest revision as of 00:55, 26 April 2022
Security related stuff.
Practical
|