From 59ae851668972bc21595531c74b17d59af2ab8ac Mon Sep 17 00:00:00 2001 From: Yuchen Pei Date: Thu, 21 Mar 2019 14:35:36 +0100 Subject: minor --- posts/2019-03-13-a-tail-of-two-densities.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/posts/2019-03-13-a-tail-of-two-densities.md b/posts/2019-03-13-a-tail-of-two-densities.md index 34d563e..4aa2b56 100644 --- a/posts/2019-03-13-a-tail-of-two-densities.md +++ b/posts/2019-03-13-a-tail-of-two-densities.md @@ -9,7 +9,8 @@ This is Part 1 of a two-part post where I give an introduction to the mathematics of differential privacy. Practically speaking, [differential privacy](https://en.wikipedia.org/wiki/Differential_privacy) -is a technique of perturbing database queries so that query results do not leak information. +is a technique of perturbing database queries so that query results do not +leak too much information while still being relatively accurate. This post however focuses on the mathematical aspects of differential privacy, which is a study of [tail bounds](https://en.wikipedia.org/wiki/Concentration_inequality) -- cgit v1.2.3