What is 'De-Anonymization'

De-anonymization is a technique in data mining that re-identifies encrypted or generalized information. De-anonymization, also referred to as data re-identification, cross-references anonymized information with other available data in order to identify a person, group, or transaction. 

BREAKING DOWN 'De-Anonymization'

The technology-savvy era is rapidly disrupting the traditional way of doing things across various sectors of the economy. In recent years, the financial industry has seen a lot of digital products introduced to its sector by fintech companies. These innovative products have promoted financial inclusion whereby more consumers have access to financial products and services at a lower cost than traditional financial institutions allow. The rise in the implementation of technology has brought about an increase in the collection, storage, and use of data. Technology tools like social media platforms, digital payment platforms, and smart phone technology have unveiled a ton of data used by various companies to enhance their interaction with consumers. This ton of data is called big data, and is a cause for concern among individuals and regulatory authorities calling for more laws that protect the identities and privacy of users.

How De-Anonymization Works

In the age of big data where sensitive information about a user’s online activities are shared instantaneously through cloud computing, data anonymization tools have been employed to protect users’ identities. Anonymization masks the personally identifiable information (PII) of users transacting in various fields like health services, social media platforms, e-commerce trades, etc. PII includes information like date of birth, Social Security Number (SSN), zip code, and IP address. The need to mask the digital trails left behind by online activities have led to the implementation of anonymization strategies like encryption, deletion, generalization, and perturbation. Although data scientists use these strategies to sever sensitive information from the shared data, they still preserve the original information, thereby opening doors for the possibility of re-identification.

De-anonymization reverses the process of anonymization by matching shared but limited data sets with data sets that are easily accessible online. Data miners can then retrieve some information from each available data set to put together a person’s identity or transaction. For example, a data miner could retrieve a data set shared by a telecommunications company, a social media site, an e-commerce platform, and a publicly available census result to determine the name and frequent activities of a user.

How De-Anonymization Is Used

Re-identification can be successful when new information is released or when the anonymization strategy implemented isn’t done properly. With a vast supply of data and limited amount of time available per day, data analysts and miners are implementing shortcuts known as heuristics in making decisions. While heuristics saves valuable time and resources in combing through a data set, it could also create gaps that could be taken advantage of if the wrong heuristic tool was implemented. These gaps could be identified by data miners seeking to de-anonymize a data set for either legal or illegal purposes.

Personally identifiable information gotten illegally from de-anonymization techniques can be sold in underground marketplaces, which are also a form of anonymization platforms. Information that falls into the wrong hands can be used for coercion, extortion, and intimidation leading to privacy concerns and enormous costs for businesses who fall victims.

De-anonymization can also be used legally. For example, the Silk Road website, an underground marketplace for illegal drugs, was hosted by an anonymized network called Tor, which uses an onion strategy to obfuscate the IP addresses of its users. The Tor network also hosts a couple of other illegal markets trading in guns, stolen credit cards, and sensitive corporate information. With the use of complex de-anonymization tools, the FBI successfully cracked and shut down Silk Road and sites engaging in child pornography.

Success on re-identification processes have proved that anonymity is not guaranteed. Even if groundbreaking anonymization tools were implemented today to mask data, the data could be re-identified in a couple of years as new technology and new data sets become available.

  1. Data Anonymization

    A data privacy technique that seeks to protect private or sensitive ...
  2. Doxing

    Doxing is the intentional act of publishing someone’s private, ...
  3. Tor

    Tor is an open source privacy network that permits users to browse ...
  4. Anonymous (Internet Group)

    Anonymous is most widely known for committing cyber-attacks to ...
  5. Verge XVG (Cryptocurrency)

    Verge (XVG) cryptocurrency relies on TOR and I2P technology to ...
  6. Coinjoin

    Coinjoin is an anonymization strategy that protects the privacy ...
Related Articles
  1. Tech

    The Rise of 'Private' Cryptocurrencies

    Dash, monero, and other cryptocurrencies with a focus on user privacy are becoming increasingly popular.
  2. Tech

    How Much Can Facebook Potentially Make from Selling Your Data?

    How much does Facebook stand to make by selling user data? Hard to be sure since they will never tell, but we try to extrapolate based on what we know.
  3. Tech

    The Five Most Private Cryptocurrencies

    Investopedia's list of private cryptocurrencies that claim to offer enhanced security and protection of user identity
  4. Insights

    What Is the Dark Net?

    The Dark Net (or Darknet) is a subset of secret websites that exist on an encrypted network.
  5. Financial Advisor

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  6. Tech

    Microsoft Will Use Blockchain To Build New Digital Identity

    Microsoft plans to use blockchain to build a new digital identity that gives users control over their personal details.
  7. Tech

    Explaining the Crypto in Cryptocurrency

    Ever wondered about the cryptography involved in cryptocurrencies?
  8. Tech

    How The SEC Regulates Social Media

    The SEC continues to develop requirements and regulations to reflect the new information age.
  9. Small Business

    What Facebook Owns That Other Social Media Do Not (FB)

    Examine Facebook's competitive advantage to understand how the network effect and application suite set it apart from other social media platforms.
  10. Personal Finance

    The New Ways Thieves Are Stealing Your Identity

    How are thieves now using new technology, like social media and old mobile phones, to steal identities?
  1. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
  2. What is the most important type of data used in business analytics?

    Consider what makes data useful in business analytics, and why companies should search for the types of data that provide ... Read Answer >>
  3. When should I use seasonally adjusted data from the consumer price index (CPI)?

    Learn what seasonally adjusted data is, how it is determined and when it should be used to evaluate the information gathered ... Read Answer >>
  4. How reliable are Glassdoor salaries?

    Glassdoor salary information may or may not be accurate, as the website offers users an opportunity to enter salary information ... Read Answer >>
  5. What impact does a higher non-farm payroll have on the forex market?

    The employment report, released by the Bureau of Labor Statistics, is an economic indicator that contains data on the employment ... Read Answer >>
Hot Definitions
  1. Inflation

    Inflation is the rate at which prices for goods and services is rising and the worth of currency is dropping.
  2. Discount Rate

    Discount rate is the interest rate charged to commercial banks and other depository institutions for loans received from ...
  3. Economies of Scale

    Economies of scale refer to reduced costs per unit that arise from increased total output of a product. For example, a larger ...
  4. Quick Ratio

    The quick ratio measures a company’s ability to meet its short-term obligations with its most liquid assets.
  5. Leverage

    Leverage results from using borrowed capital as a source of funding when investing to expand the firm's asset base and generate ...
  6. Financial Risk

    Financial risk is the possibility that shareholders will lose money when investing in a company if its cash flow fails to ...
Trading Center