...
Drawio | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
The first category, called user-side techniques, requires the full involvement of the end-user in order to protect his privacy. User-side methods incorporate two fundamental PETs classes specifically, anti-tracking technologies, e.g., ad-blockers and anti-finger-printings; and privacy preserving certification. It also involves two sub-categories, called data perturbation and Secure Multi-Party Computation (SMC), under the obfuscation and secure computation mechanisms, respectively.
...