pp.4-5, again, possibly a sweeping statement about anonymisation. Yes, anonymisation can never be perfect or undoable. But be careful not to imply that it is a useless tool. Differential privacy is pretty effective, although it would in most cases dramatically reduce utility. But even standard methods have a place in data sharing – surely you would agree that sharing carefully anonymised data is better than sharing personal data? After all, I would guess that the obfuscation techniques you talk about in section 3 will fall under this exact same issue – you are effectively anonymising the location data, for instance.
pp.4-5, again, possibly a sweeping statement about anonymisation. Yes, anonymisation can never be perfect or undoable. But be careful not to imply that it is a useless tool. Differential privacy is pretty effective, although it would in most cases dramatically reduce utility. But even standard methods have a place in data sharing – surely you would agree that sharing carefully anonymised data is better than sharing personal data? After all, I would guess that the obfuscation techniques you talk about in section 3 will fall under this exact same issue – you are effectively anonymising the location data, for instance.