"Anonymized" data isn't nameless — it's name-adjacent. Strip out direct identifiers like name and email, and what's left — ZIP code, birth date, device fingerprints, movement trails, purchase timestamps — still behaves like a fingerprint. Link that "anonymous" fingerprint to a few public crumbs and you've got a person. Think of it like guessing your neighbor from three facts: the car they drive, the time they leave, and the dog that hates Thursdays. You don't need a badge, just cross-reference.
Classic research showed how Massachusetts Governor William Weld's "de-identified" hospital record was linked using voter rolls — ancient history that still lands. ( EPIC , UC Berkeley )
01 What the Numbers Actually Say
Shopping metadata is just as telling. Researchers linked "anonymous" Netflix Prize ratings to IMDb activity and identified users — revealing sensitive preferences in the process. Translation: your 2 a.m. documentary binge is not a secret handshake. ( arXiv , UT Austin CS )
02 It's Not Theoretical — It Leaks Into Real Life
NYC Taxi Data Fiasco
"Anonymized" trip logs let sleuths tie rides to celebrities and estimate tips by cross-matching paparazzi photos. If you can find Bradley Cooper's fare, you can find anyone's.
Fast Company ↗ mathbabe ↗Strava Heatmap
A public fitness "heat map" exposed patrol routes and locations of sensitive military sites worldwide. That wasn't an exploit — it was default sharing plus easy linkage. Zero hacking required.
The Guardian ↗ WIRED ↗Follow the Money — There's a Full Market for This
Re-ID isn't a hobby; it's how a multi-hundred-billion-dollar data broker economy stitches profiles together from ad trackers, SDKs, credit headers, geolocation pings, loyalty programs, and public records.
Recent FTC enforcement targeted location data sellers precisely because those feeds can be linked to sensitive places — clinics, shelters, places of worship. That's not "maybe" — that's the sales pitch.
FTC Report ↗ The Verge ↗ FTC v. Kochava ↗03 How the Sausage Gets Made — 60-Second Version
Collect
SDKs inside everyday apps vacuum up GPS, Wi-Fi, accelerometer data, and advertising IDs. Websites drop cookies and grab browser and device fingerprints the moment you land.
Clean & Stitch
Brokers unify data streams using stable keys — mobile ad IDs, hashed emails, credit headers — and unstable ones like behavioral similarities and home/work location patterns.
Enrich
Public records, purchase histories, and third-party lists get fused into "audience segments." At this stage you're no longer a device — you're a profile with a health history and a political lean.
Sell & Score
Insurers, marketers, political operatives, "risk intelligence" shops, and government buyers get access. Not a magic trick — a pipeline. ( FTC )
04 "But It Was Anonymized!" — Why That Promise Flops
-
Human patterns are unique Movement, shopping, streaming — your habits are sparse and distinctive. You don't need all the data; just a few anchor points. Your commute is basically a signature. ( PubMed )
-
Auxiliary data is everywhere and eternal Voter files, property records, social media, breach dumps, paparazzi shots — linkage fuel that never expires. The Netflix and NYC taxi cases only needed public crumbs to unravel.
-
Anonymization ≠ immunity Even NIST's guidance documents catalog repeated failures of naïve de-identification in the wild. "We removed names" is about as protective as removing your license plate and leaving your VIN on the windshield. ( NIST IR 8053 )
Anonymization promises are like umbrella drinks — cute, sweet, and best enjoyed with a healthy dose of skepticism.
05 Why You Should Care — Even If You're "Boring"
Because decisions get made about you using data like you — and once it's re-identified, it's person-level and portable. Insurance, lending, housing, and dynamic pricing systems sort you by patterns. Location linkage to sensitive places enables targeted harassment, stalking, and discrimination. Regulators keep citing exactly these risks when they act. FTC v. Kochava ↗
06 Okay — So What Do You Actually Do?
No need to move to a cabin. Just stop being an all-you-can-eat buffet.
Kill Easy Linkers
Reset and limit advertising IDs. Deny "always on" location access. Turn off precise location for apps that have zero business knowing where you are.
Fix Your Browser
Use Firefox or Brave with tracker blocking and container isolation. Install uBlock Origin. Separate profiles for work, shopping, and personal use.
Compartmentalize Identity
Use email aliases and a password manager. Enable MFA and passkeys everywhere. One leak shouldn't link everything you've ever touched.
Starve the Broker Pipeline
Opt out of major people-finder sites. Freeze your credit. It won't make you invisible, but it lowers the resale value of your profile.
Audit Your Home Network
Put IoT devices on a separate SSID. Use DNS filtering to block the worst telemetry. Your smart TV is a data collection device that also plays Netflix.
Be Boring in Public
Post on a delay. Shrink your audience. Skip broadcasting school, work, and home routines. Your future self says thanks.
"You're not hiding — you're negotiating. Stop giving the other side your notes."Occu·NX — The Dispatch



