I see.
Again, it goes back to my point about the issue of putting the emphasis on the specific pieces of data that are being leaked versus how that data is analyzed. As more and more data leaks are happening, this means that malicious individuals have access to more and more information about individuals. They can then go and find a line through these data leaks.
It makes it easier for them to go and reidentify people from data that has been protected through de-identification. Whereas, if instead we focus on the algorithms that are being used to analyze this data, we can ensure that the output of the analysis is not going to leak additional information about the individuals. That is how we will control how much information is available about individuals to malicious entities. It's really about changing the focus from trying to modify the data itself to how we analyze the data.