๐๏ธโ๐จ๏ธChapter 2 : De-Identification
Valeria seeks your expertise in implementing De-Identification tactics to securely share her mercenariesโ information with a powerful galactic arms dealer for a business partnership.
Shadows database, houses sensitive information about Valeriaโs deadly mercenaries. Valeria implores your help to assess the data masking techniques used for sharing the mercenary personal information with a galactic arms conglomerate.
Key Takeaways:
โ Understand how de-identification works
โ Get introduced to concepts around input and output privacy
โ Get familiar with practical de-identification techniques
โ Learn about the concepts behind differential privacy
โ Get introduced to privacy threat modeling
Last updated