- Naive anonymization of networks provides poor privacy protection against attacks using external information. Stronger techniques are needed.
- Many approaches transform networks while aiming to preserve utility. Transformations include adding/removing edges, clustering nodes, and random alterations.
- The goal is to obscure identifying features while hopefully preserving overall topology, in order to resist re-identification and protect sensitive relationships.