is the fundamental threat to anonymization. It demonstrates that whether data is identifiable depends not on the data itself but on what *other* data is available to an attacker.