5 Anonymization Methods

Choose the right protection method for your compliance requirements. From complete redaction to reversible encryption, we've got you covered.

Redact

Completely remove PII from the document, replacing it with a placeholder like [REDACTED].

Before

Contact John Smith at john.smith@company.com

After

Contact [REDACTED] at [REDACTED]

Best For:
Legal documentsFOIA requestsPublic recordsCourt filings

Mask

Partially obscure PII while keeping some characters visible for reference.

Before

Contact John Smith at john.smith@company.com

After

Contact J*** S**** at j***.s****@c******.com

Best For:
Customer supportVerification displaysPartial visibility needsUser interfaces

Replace

Substitute detected PII with realistic fake data that maintains document readability.

Before

Contact John Smith at john.smith@company.com

After

Contact Jane Doe at jane.doe@example.com

Best For:
Testing environmentsDemo data generationTraining datasetsDocument sharing

Hash (SHA-256)

One-way cryptographic hash that allows for consistent pseudonymization across documents.

Before

Contact John Smith at john.smith@company.com

After

Contact a1b2c3d4 at e5f6g7h8

Best For:
Research dataAnalyticsCross-document linkingPseudonymization

Encrypt (AES-256-GCM)

Reversible encryption that allows authorized users to recover original data with the correct key.

Before

Contact John Smith at john.smith@company.com

After

Contact [ENC:xyz123] at [ENC:abc456]

Best For:
Temporary anonymizationData recovery needsAudit requirementsReversible workflows
Learn more about Reversible Encryption

Method Comparison

MethodReversibleReadableLinkableBest For
Redact NoPartial NoLegal, Public Records
MaskPartialPartial NoSupport, UI Display
Replace No Yes NoTesting, Demos
Hash (SHA-256) No No YesResearch, Analytics
Encrypt (AES-256-GCM) Yes No NoTemporary, Audit

Try All Methods Free

Start with 200 free tokens per cycle. Experiment with all anonymization methods.