logoalt Hacker News

schnableyesterday at 3:34 PM1 replyview on HN

how do de-aggregation attacks or whatever you'd call this work?


Replies

snapcasteryesterday at 3:51 PM

One of the easiest methods is to find a different data source with overlap and use that to map real people to anonymized lists. Big tech companies find this super easy to do because of all the internal data they already have on everyone