Page cover image

👁️‍🗨️Chapter 2 : De-Identification

Valeria seeks your expertise in implementing De-Identification tactics to securely share her mercenaries’ information with a powerful galactic arms dealer for a business partnership.

Shadows database, houses sensitive information about Valeria’s deadly mercenaries. Valeria implores your help to assess the data masking techniques used for sharing the mercenary personal information with a galactic arms conglomerate.

Key Takeaways:

  • ✅ Understand how de-identification works

  • ✅ Get introduced to concepts around input and output privacy

  • ✅ Get familiar with practical de-identification techniques

  • ✅ Learn about the concepts behind differential privacy

  • ✅ Get introduced to privacy threat modeling

Last updated

Was this helpful?