Skip to main content

Questions tagged [k-anonymity]

The tag has no usage guidance.

3 votes
1 answer
174 views

Why does HIBP use k-anonymity when checking passwords? [duplicate]

Maybe I'm misunderstanding the purpose of k-anonymity, but I don't see the why HIBP uses it when checking user passwords. This website, which explains HIBP's implementation of it, says, "The ...
noG23's user avatar
  • 33
2 votes
1 answer
1k views

How choose a k for k-anonymity?

I have manually scraped multiple pages of search results on Google and haven't found a single suggestion as to how to find an optimal k when you are trying to "k-anonymize" your dataset. All ...
Denny's user avatar
  • 45
2 votes
1 answer
2k views

What is the definition of "sensitive attribute" in the context of k-anonimity?

I have encountered the term "sensitive attribute" multiple times when reading up on the concept of k-anonimity -- but the texts never formally define what this term means. Take this example ...
Denny's user avatar
  • 45
2 votes
2 answers
833 views

How to explain "the k-anonymity model used by HaveIBeenPwned for pwned passwords doesn't expose your passwords" to a layman?

People are naturally skeptical when they hear about the HaveIBeenPwned pwned passwords search, because who would in their right mind enter their password into a random website? And sure, HIBP uses k-...
Nzall's user avatar
  • 7,563