open-source
checklist
security
awesome
privacy
protection
surveillance
cybersecurity
awesome-list
censorship
defense
web-browsing
security-tools
privacy-protection
-
Updated
Apr 8, 2022


In the existing sample for batch analysis, the logic goes over all the columns and looks for PII. We'd like to extend this with logic which also evaluates how likely a column contains PII based on its name.
For example, if a column name is
Age, and the values are[19,55,2,39], the column name coul