Quote:
Originally Posted by warescouse
Following on from your revelation I noticed that Bruce Schneier, who was mentioned a few pages earlier in this thread, did a mention of a joint paper by the said mentioned.
http://www.wired.com/politics/securi...tymatters_1213
I found the comment "The moral is that it takes only a small named database for someone to pry the anonymity off a much larger anonymous database." quite an interesting point. In a nutshell, if I have not misunderstood, the gist it seems is that if you can extract some identifying data from say from a blog or from in fact anywhere, you can apply this to a larger anonymous database and quite possibly identify the individual and their habits from this. The algorithms apparently used are fairly robust.
|
This is one of the main reasons I have been writing to the ICO saying they should be supporting the public not allowing Phorm in any form on the ISPs.
Sadly the present ICO staff are either totallly lacking in vision of what can happen, lacking in any ability to understand or totally incompetant on technical issues.
BT management on the other hand shjould be able to understand hence the last remark for the ICO is inline or people in high places have accepted some phorm of gratification to see this through.