How to exploit data at the time of the GDPR

>