aboutsummaryrefslogtreecommitdiff
path: root/posts/2019-03-13-a-tail-of-two-densities.md
diff options
context:
space:
mode:
Diffstat (limited to 'posts/2019-03-13-a-tail-of-two-densities.md')
-rw-r--r--posts/2019-03-13-a-tail-of-two-densities.md3
1 files changed, 2 insertions, 1 deletions
diff --git a/posts/2019-03-13-a-tail-of-two-densities.md b/posts/2019-03-13-a-tail-of-two-densities.md
index 34d563e..4aa2b56 100644
--- a/posts/2019-03-13-a-tail-of-two-densities.md
+++ b/posts/2019-03-13-a-tail-of-two-densities.md
@@ -9,7 +9,8 @@ This is Part 1 of a two-part post where I give an introduction to
the mathematics of differential privacy.
Practically speaking, [differential privacy](https://en.wikipedia.org/wiki/Differential_privacy)
-is a technique of perturbing database queries so that query results do not leak information.
+is a technique of perturbing database queries so that query results do not
+leak too much information while still being relatively accurate.
This post however focuses on the mathematical aspects of differential privacy, which is
a study of [tail bounds](https://en.wikipedia.org/wiki/Concentration_inequality)