Questions tagged [k-anonymity]
The k-anonymity tag has no usage guidance.
4
questions
3
votes
1
answer
174
views
Why does HIBP use k-anonymity when checking passwords? [duplicate]
Maybe I'm misunderstanding the purpose of k-anonymity, but I don't see the why HIBP uses it when checking user passwords.
This website, which explains HIBP's implementation of it, says, "The ...
2
votes
1
answer
1k
views
How choose a k for k-anonymity?
I have manually scraped multiple pages of search results on Google and haven't found a single suggestion as to how to find an optimal k when you are trying to "k-anonymize" your dataset. All ...
2
votes
1
answer
2k
views
What is the definition of "sensitive attribute" in the context of k-anonimity?
I have encountered the term "sensitive attribute" multiple times when reading up on the concept of k-anonimity -- but the texts never formally define what this term means.
Take this example ...
2
votes
2
answers
833
views
How to explain "the k-anonymity model used by HaveIBeenPwned for pwned passwords doesn't expose your passwords" to a layman?
People are naturally skeptical when they hear about the HaveIBeenPwned pwned passwords search, because who would in their right mind enter their password into a random website? And sure, HIBP uses k-...