When using « standard » databases

 
 

Basic data

are organized in individual records, each record corresponding to an « owner ». Inside each record, data are not anonymous.

 

Each record

contains an identifier, usually secured and encrypted.

 

This identifier

is used by the system to know who is the «owner» of the data.

 

Hackers

concentrate their efforts on these identifiers, because once cracked, they yield immediately to the complete set of data.