Ezabatu
Kendu PII dokumentutik erabat, ordezkatuz [REDACTED] bezalako ordezko batekin.
Jarri harremanetan John Smith helbidean john.smith@company.com
Jarri harremanetan [REDACTED] helbidean [REDACTED]
Maskara
PII partzialki estali, erreferentziarako karaktere batzuk ikusgai utziz.
Jarri harremanetan John Smith helbidean john.smith@company.com
Jarri harremanetan J*** S**** helbidean j***.s****@c******.com
Ordeztu
Detektatutako PII ordezkatu datu faltsu errealistarekin, dokumentuaren irakurgarritasuna mantenduz.
Jarri harremanetan John Smith helbidean john.smith@company.com
Jarri harremanetan Jane Doe helbidean jane.doe@example.com
Hash (SHA-256)
Kriptografia hash bide bakarrekoa, dokumentu guztietan pseudonimizazio koherentea ahalbidetzen duena.
Jarri harremanetan John Smith helbidean john.smith@company.com
Jarri harremanetan a1b2c3d4 helbidean e5f6g7h8
Enkriptatu (AES-256-GCM)
Enkriptazio alderantzizkoa, erabiltzaile baimenduei jatorrizko datuak berreskuratzeko aukera ematen diena giltza egokiarekin.
Jarri harremanetan John Smith helbidean john.smith@company.com
Jarri harremanetan [ENC:xyz123] helbidean [ENC:abc456]
pages.anonymizationMethods.methods.encryptAsym.name
pages.anonymizationMethods.methods.encryptAsym.description
pages.anonymizationMethods.methods.encryptAsym.exampleBefore
pages.anonymizationMethods.methods.encryptAsym.exampleAfter
Metodoen Konparaketa
| Metodoa | Alderantzizkoa | Irakurgarria | Lotu daiteke | Hoberena |
|---|---|---|---|---|
| Ezabatu | Ez | Partziala | Ez | Lege, Erregistro Publikoak |
| Maskara | Partziala | Partziala | Ez | Laguntza, UI Erakustaldia |
| Ordeztu | Ez | Bai | Ez | Probak, Demoak |
| Hash (SHA-256) | Ez | Ez | Bai | Ikerketa, Analitika |
| Enkriptatu (AES-256-GCM) | Bai | Ez | Ez | Behin-behineko, Ikuskaritza |
| pages.anonymizationMethods.methods.encryptAsym.name | pages.anonymizationMethods.comparison.rows.encryptAsym.reversible | pages.anonymizationMethods.comparison.rows.encryptAsym.readable | pages.anonymizationMethods.comparison.rows.encryptAsym.linkable | pages.anonymizationMethods.comparison.rows.encryptAsym.bestFor |
Is This Right For You?
Best For
- ✦Teams choosing between 7 anonymization operators (replace, mask, hash, encrypt, redact, fake, custom) per entity type
- ✦GDPR pseudonymization vs true anonymization compliance decisions with reversible encryption for audit trails
- ✦Mixed-operator workflows where different entity types require different anonymization strategies
- ✦Comparison-driven decision making with reversibility, readability, and linkability trade-offs
Not For
- ✦Teams preferring a single "black box" redaction without operator selection or configuration
- ✦Use cases requiring original PII tokens to survive exactly unchanged (encryption wraps tokens with metadata)