Redact
Completely remove PII from the document, replacing it with a placeholder like [REDACTED].
Contact John Smith at john.smith@company.com
Contact [REDACTED] at [REDACTED]
Mask
Partially obscure PII while keeping some characters visible for reference.
Contact John Smith at john.smith@company.com
Contact J*** S**** at j***.s****@c******.com
Replace
Substitute detected PII with realistic fake data that maintains document readability.
Contact John Smith at john.smith@company.com
Contact Jane Doe at jane.doe@example.com
Hash (SHA-256)
One-way cryptographic hash that allows for consistent pseudonymization across documents.
Contact John Smith at john.smith@company.com
Contact a1b2c3d4 at e5f6g7h8
Encrypt (AES-256-GCM)
Reversible encryption that allows authorized users to recover original data with the correct key.
Contact John Smith at john.smith@company.com
Contact [ENC:xyz123] at [ENC:abc456]
Asymmetric Encrypt (RSA-4096)
Public-key encryption for multi-party workflows. External apps encrypt with your public key, only you can decrypt with your private key. Uses RSA-4096 + AES-256-GCM hybrid encryption.
Contact John Smith at john.smith@company.com
Contact GIszLbhC+eP04L7Z...== at TKm1qial5As...==
Method Comparison
| Method | Reversible | Readable | Linkable | Best For |
|---|---|---|---|---|
| Redact | No | Partial | No | Legal, Public Records |
| Mask | Partial | Partial | No | Support, UI Display |
| Replace | No | Yes | No | Testing, Demos |
| Hash (SHA-256) | No | No | Yes | Research, Analytics |
| Encrypt (AES-256-GCM) | Yes | No | No | Temporary, Audit |
| Asymmetric Encrypt (RSA-4096) | Yes | No | No | Multi-party, External Apps |
Is This Right For You?
Best For
- ✦Teams choosing between 7 anonymization operators (replace, mask, hash, encrypt, redact, fake, custom) per entity type
- ✦GDPR pseudonymization vs true anonymization compliance decisions with reversible encryption for audit trails
- ✦Mixed-operator workflows where different entity types require different anonymization strategies
- ✦Comparison-driven decision making with reversibility, readability, and linkability trade-offs
Not For
- ✦Teams preferring a single "black box" redaction without operator selection or configuration
- ✦Use cases requiring original PII tokens to survive exactly unchanged (encryption wraps tokens with metadata)