Fig. 1From: Pseudonymization for research data collection: is the juice worth the squeeze?Basic attack scenario addressed by pseudonymizationBack to article page