how do de-aggregation attacks or whatever you'd call this work?
One of the easiest methods is to find a different data source with overlap and use that to map real people to anonymized lists. Big tech companies find this super easy to do because of all the internal data they already have on everyone
One of the easiest methods is to find a different data source with overlap and use that to map real people to anonymized lists. Big tech companies find this super easy to do because of all the internal data they already have on everyone