Security notes / Anonymization notes: Difference between revisions
Jump to navigation
Jump to search
(Created page with "{{SecurityRelated}} <!-- Say : you want to provide data to someone for some analytics. : You know that it has personally identifiable fields, like username, IP address, lic...") |
mNo edit summary |
||
Line 24: | Line 24: | ||
If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values. | If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values. | ||
This is a perfectly feasible attack for all the things just named - and so simple to you don't need any | This is a perfectly feasible attack for all the things just named - and so simple to you don't need any cryptographic knowledge. | ||
Latest revision as of 23:55, 25 April 2022
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |