By now the general public has become aware that mobile phone applications, bank security systems and credit card databases are not immune to vulnerabilities; information thefts happen. Some computer scientists now say it's time to recognize that vulnerabilities in genetic databases need recognition too. Are anonymous genetic profiles truly anonymous? Is data de-identifying technically feasible for genetic data?
↧