This document performs an analysis of the security and privacy implications of different types of “transient numeric identifiers”