Re-Identification Advisory — OccuNX
Privacy Advisory Last Updated: November 15, 2025  ·  Generated by OccuNX

Consumer Advisory · Data Re-Identification

Meet the Unmasking Economy
How "ANONYMOUS" DATA FINDS YOUR NAME

Strip your name from a dataset and what's left still points back to you. Here's the research, the real-world disasters, and what you can actually do about it.

"Anonymized data is like 'boneless wings' — rebranded, still chicken."

OccuNX Advisory

What the numbers actually say

"Anonymized" data isn't nameless — it's name-adjacent. Strip out direct identifiers like name and email, and what's left — ZIP code, birth date, device fingerprints, movement trails, purchase timestamps — still behaves like a fingerprint. Link that "anonymous" fingerprint to a few public crumbs and you've got a person. Think of it like guessing your neighbor from three facts: the car they drive, the time they leave, and the dog that hates Thursdays.

Classic research showed how Massachusetts Governor William Weld's "de-identified" hospital record was linked using voter rolls — ancient history that still lands. ( EPIC , UC Berkeley )

95%
of people in a 1.5M-user dataset uniquely identified using just 4 location points
90%
of individuals re-identified from 3 months of credit card records using just 4 purchases
87%
of Americans uniquely identifiable from ZIP code, birth date, and gender alone

Shopping metadata is just as telling. Researchers linked "anonymous" Netflix Prize ratings to IMDb activity and identified users — revealing sensitive preferences in the process. Translation: your 2 a.m. documentary binge is not a secret handshake. ( arXiv , UT Austin CS )

It's not theoretical — it leaks into real life

Incident · 2014

NYC Taxi Data Fiasco

"Anonymized" trip logs let sleuths tie rides to celebrities and estimate tips by cross-matching paparazzi photos. If you can find Bradley Cooper's fare, you can find anyone's.

Fast Company ↗ mathbabe ↗
Ongoing Cautionary Tale · 2018→

Strava Heatmap

A public fitness "heat map" exposed patrol routes and locations of sensitive military sites worldwide. That wasn't an exploit — it was default sharing plus easy linkage. Zero hacking required.

The Guardian ↗ WIRED ↗
Systemic · Ongoing

Follow the Money — There's a Full Market for This

Re-ID isn't a hobby; it's how a multi-hundred-billion-dollar data broker economy stitches profiles together from ad trackers, SDKs, credit headers, geolocation pings, loyalty programs, and public records.

Recent FTC enforcement targeted location data sellers precisely because those feeds can be linked to sensitive places — clinics, shelters, places of worship. That's not "maybe" — that's the sales pitch.

FTC Report ↗ The Verge ↗ FTC v. Kochava ↗

How the sausage gets made — 60-second version

01

Collect

SDKs inside everyday apps vacuum up GPS, Wi-Fi, accelerometer data, and advertising IDs. Websites drop cookies and grab browser and device fingerprints the moment you land.

02

Clean & Stitch

Brokers unify data streams using stable keys — mobile ad IDs, hashed emails, credit headers — and unstable ones like behavioral similarities and home/work location patterns.

03

Enrich

Public records, purchase histories, and third-party lists get fused into "audience segments." At this stage you're no longer a device — you're a profile with a health history and a political lean.

04

Sell & Score

Insurers, marketers, political operatives, "risk intelligence" shops, and government buyers get access. Not a magic trick — a pipeline. ( FTC )

"But it was anonymized!" — why that promise flops

  • 🎯
    Human patterns are unique Movement, shopping, streaming — your habits are sparse and distinctive. You don't need all the data; just a few anchor points. Your commute is basically a signature. ( PubMed )
  • 🔗
    Auxiliary data is everywhere and eternal Voter files, property records, social media, breach dumps, paparazzi shots — linkage fuel that never expires. The Netflix and NYC taxi cases only needed public crumbs to unravel.
  • 🪪
    Anonymization ≠ immunity Even NIST's guidance documents catalog repeated failures of naïve de-identification in the wild. "We removed names" is about as protective as removing your license plate and leaving your VIN on the windshield. ( NIST IR 8053 )

Why you should care — even if you're "boring"

Because decisions get made about you using data like you — and once it's re-identified, it's person-level and portable.

💸
Eligibility & Pricing
Insurance, lending, housing, and dynamic pricing systems sort you by patterns. Re-ID makes those patterns person-level and portable.
🎯
Safety & Stigma
Location linkage to sensitive places enables targeted harassment, stalking, and discrimination. Regulators keep citing exactly these risks.

Okay — so what do you actually do?

No need to move to a cabin. Just stop being an all-you-can-eat buffet.

📵

Kill Easy Linkers

Reset and limit advertising IDs. Deny "always on" location access. Turn off precise location for apps that have zero business knowing where you are.

🌐

Fix Your Browser

Use Firefox or Brave with tracker blocking and container isolation. Install uBlock Origin. Separate profiles for work, shopping, and personal use.

📧

Compartmentalize Identity

Use email aliases and a password manager. Enable MFA and passkeys everywhere. One leak shouldn't link everything you've ever touched.

🗂️

Starve the Broker Pipeline

Opt out of major people-finder sites. Freeze your credit. It won't make you invisible, but it lowers the resale value of your profile.

🏠

Audit Your Home Network

Put IoT devices on a separate SSID. Use DNS filtering to block the worst telemetry. Your smart TV is a data collection device that also plays Netflix.

🔇

Be Boring in Public

Post on a delay. Shrink your audience. Skip broadcasting school, work, and home routines. Your future self says thanks.

"Anonymized data is like 'boneless wings' — rebranded, still chicken."

"You're not hiding — you're negotiating. Stop giving the other side your notes."

Bottom Line

Re-identification persists because it pays. There's steady demand, mature tooling, and a regulatory game of whack-a-mole. Treat anonymization promises like umbrella drinks — cute, sweet, and best enjoyed with a healthy dose of skepticism. Then build layers so when your data leaks (and it will), it drips, not floods.

ML here