Ted is writing things

On privacy, research, and privacy research.

All posts

l-diversity, because reidentification doesn't tell the whole story

\(l\)-diversity is the first famous attempt at considering stronger attack models than simply reidentification attacks. Let's see how it works, and which flaws of \(k\)-anonmyity it fixes!

Book review: Crash Override

A short review of Crash Override, by Zoë Quinn. tl;dr: you should read it, especially if you're building tech products or working in tech policy.

k-map, the weird cousin of k-anonymity

Weakening \(k\)-anonymity, really? This sounds weird, but this can actually quite reasonable. Let's learn why!

Book review: Twitter and Tear Gas

A short review of Twitter and Tear Gas: The Power and Fragility of Networked Protest, by Zeynep Tufekci. tl;dr: you should read it, especially if you participate in activist movements.

Biometrics: authentication or identification?

Know the difference. It can probably not save your life, but it can certainly avoid you saying nonsensical things on the Internet.

k-anonymity, the parent of all privacy definitions

How a privacy researcher proved a politician wrong, and how she created the first ever definition of anonymity in the process.


Blog intro. What's going to be there?

All opinions here are my own, not my employers'.
I'm always glad to get feedback! If you'd like to contact me, please do so via e-mail (se.niatnofsed@neimad) or Twitter (@TedOnPrivacy).