- l-diversity, because reidentification doesn't tell the whole story —
\(l\)-diversity is the first famous attempt at considering stronger attack models than simply reidentification attacks. Let's see how it works, and which flaws of \(k\)-anonmyity it fixes!
- Book review: Crash Override —
A short review of Crash Override, by Zoë Quinn. tl;dr: you should read it, especially if you're building tech products or working in tech policy.
- k-map, the weird cousin of k-anonymity —
Weakening \(k\)-anonymity, really? This sounds weird, but this can actually quite reasonable. Let's learn why!
- Book review: Twitter and Tear Gas —
A short review of Twitter and Tear Gas: The Power and Fragility of Networked Protest, by Zeynep Tufekci. tl;dr: you should read it, especially if you participate in activist movements.
- Biometrics: authentication or identification? —
Know the difference. It can probably not save your life, but it can certainly avoid you saying nonsensical things on the Internet.
- k-anonymity, the parent of all privacy definitions —
How a privacy researcher proved a politician wrong, and how she created the first ever definition of anonymity in the process.
- Beginnings —
Blog intro. What's going to be there?