This document discusses data explosion and the lack of privacy protections for personally identifiable information. It provides examples of how much user data companies collect and store. It then discusses how anonymizing data by removing personally identifying information like names is not enough to protect privacy, as external data can be linked to the anonymized data using quasi-identifiers like zip codes, dates of birth, and other attributes. Methods for achieving k-anonymity are discussed, but these are shown to still leak private information through various attacks. The document examines different privacy models and their limitations in protecting user privacy.