top | item 46193432 (no title) schnable | 2 months ago how do de-aggregation attacks or whatever you'd call this work? discuss order hn newest snapcaster|2 months ago One of the easiest methods is to find a different data source with overlap and use that to map real people to anonymized lists. Big tech companies find this super easy to do because of all the internal data they already have on everyone
snapcaster|2 months ago One of the easiest methods is to find a different data source with overlap and use that to map real people to anonymized lists. Big tech companies find this super easy to do because of all the internal data they already have on everyone
snapcaster|2 months ago