In which case would one use the Modrian algorithm for (minimal) k-anonymization over SQL?

The Modrian algorithm has no knowledge of the inherent hierarchies and structures of data. By using manual SQL one could do the following mapping:
Berlin, Hamburg, Munich -> Germany
London, Manchester, Glasgow -> United Kingdom
While… Continue reading In which case would one use the Modrian algorithm for (minimal) k-anonymization over SQL?

How to explain "the k-anonymity model used by HaveIBeenPwned for pwned passwords doesn’t expose your passwords" to a layman?

People are naturally skeptical when they hear about the HaveIBeenPwned pwned passwords search, because who would in their right mind enter their password into a random website? And sure, HIBP uses k-anonymity to make sure they don’t know y… Continue reading How to explain "the k-anonymity model used by HaveIBeenPwned for pwned passwords doesn’t expose your passwords" to a layman?

Firefox Monitor starts tracking breached email addresses

Mozilla has formally launched Firefox Monitor, a privacy-engineered website that hooks up to Troy Hunt’s Have I Been Pwned? (HIBP) breach notification database. Continue reading Firefox Monitor starts tracking breached email addresses