Marx, MatthiasZimmer, EphraimMueller, TobiasBlochberger, MaximilianFederrath, HannesLangweg, HannoMeier, MichaelWitt, Bernhard C.Reinhardt, Delphine2018-03-222018-03-222018978-3-88579-675-6https://dl.gi.de/handle/20.500.12116/16294It is common practice of web tracking services to hash personally identifiable information (PII), e. g., e-mail or IP addresses, in order to avoid linkability between collected data sets of web tracking services and the corresponding users while still preserving the ability to update and merge data sets associated to the very same user over time. Consequently, these services argue to be complying with existing privacy laws as the data sets allegedly have been pseudonymised. In this paper, we show that the finite pre-image space of PII is bounded in such a way, that an attack on these hashes is significantly eased both theoretically as well as in practice. As a result, the inference from PII hashes to the corresponding PII is intrinsically faster than by performing a naive brute-force attack. We support this statement by an empirical study of breaking PII hashes in order to show that hashing of PII is not a sufficient pseudonymisation technique.enpersonally identifiable informationhashingpseudonymisationHashing of personally identifiable information is not sufficientText/Conference Paper10.18420/sicherheit2018_041617-5468