Ficha
Ondoa kabisa PII kutoka kwa hati, ukibadilisha na nafasi kama [REDACTED].
Wasiliana na John Smith kwa john.smith@company.com
Wasiliana na [REDACTED] kwa [REDACTED]
Ficha Sehemu
Ficha sehemu ya PII huku ukiacha baadhi ya herufi zikionekana kwa marejeleo.
Wasiliana na John Smith kwa john.smith@company.com
Wasiliana na J*** S**** kwa j***.s****@c******.com
Badilisha
Badilisha PII iliyogunduliwa na data bandia halisi inayodumisha usomekaji wa hati.
Wasiliana na John Smith kwa john.smith@company.com
Wasiliana na Jane Doe kwa jane.doe@example.com
Hash (SHA-256)
Njia ya usimbaji wa kriptografia ya njia moja inayoruhusu ufichaji wa jina la bandia thabiti katika hati.
Wasiliana na John Smith kwa john.smith@company.com
Wasiliana na a1b2c3d4 kwa e5f6g7h8
Ficha kwa Njia ya Siri (AES-256-GCM)
Usimbaji wa siri unaoweza kurudishwa unaoruhusu watumiaji walioidhinishwa kurejesha data ya awali kwa kutumia ufunguo sahihi.
Wasiliana na John Smith kwa john.smith@company.com
Wasiliana na [ENC:xyz123] kwa [ENC:abc456]
pages.anonymizationMethods.methods.encryptAsym.name
pages.anonymizationMethods.methods.encryptAsym.description
pages.anonymizationMethods.methods.encryptAsym.exampleBefore
pages.anonymizationMethods.methods.encryptAsym.exampleAfter
Ulinganisho wa Njia
| Njia | Inaweza Kurudishwa | Inasomeka | Inaweza Kuunganishwa | Bora Kwa |
|---|---|---|---|---|
| Ficha | Hapana | Sehemu | Hapana | Kisheria, Rekodi za Umma |
| Ficha Sehemu | Sehemu | Sehemu | Hapana | Msaada, Onyesho la UI |
| Badilisha | Hapana | Ndio | Hapana | Upimaji, Demos |
| Hash (SHA-256) | Hapana | Hapana | Ndio | Utafiti, Uchambuzi |
| Ficha kwa Njia ya Siri (AES-256-GCM) | Ndio | Hapana | Hapana | Muda, Ukaguzi |
| pages.anonymizationMethods.methods.encryptAsym.name | pages.anonymizationMethods.comparison.rows.encryptAsym.reversible | pages.anonymizationMethods.comparison.rows.encryptAsym.readable | pages.anonymizationMethods.comparison.rows.encryptAsym.linkable | pages.anonymizationMethods.comparison.rows.encryptAsym.bestFor |
Is This Right For You?
Best For
- ✦Teams choosing between 7 anonymization operators (replace, mask, hash, encrypt, redact, fake, custom) per entity type
- ✦GDPR pseudonymization vs true anonymization compliance decisions with reversible encryption for audit trails
- ✦Mixed-operator workflows where different entity types require different anonymization strategies
- ✦Comparison-driven decision making with reversibility, readability, and linkability trade-offs
Not For
- ✦Teams preferring a single "black box" redaction without operator selection or configuration
- ✦Use cases requiring original PII tokens to survive exactly unchanged (encryption wraps tokens with metadata)