Anonymity is the practice of utilizing systems and methods which protect identity. Used for questions about anonymity and data anonymization.
Questions tagged [anonymity]
46 questions
0
votes
0 answers
Shuffling as anonymization technique for public data
Shuffling has been approved as a data de-identifcation technique by the EU Protection Board in Opinion on Anonymisation Techniques, 05/2014”. However, there has been very little discussion of appropriate use cases and risks. Talend, Informatica,…

Brad Schoening
- 1,281
- 6
- 22
0
votes
1 answer
Database anonymization : Using additive noise
I want to do an experiment involving the use of additive noise for protecting a database from inference attacks.
My database should begin by generating a specific list of values that have a mean of 25, Then I will anonymize these values by adding a…

sna
- 1
- 2
0
votes
1 answer
How to set firefox to not share information with web sites (browser version, screen resolution, OS, etc.)?
so, does anybody knows how to turn off information sharing?
This is the kind of information i don't wish to share with websites:
Thanks!

Murad Alm.
- 79
- 9
0
votes
1 answer
Crypting mail addresses - funny design problem
In my web project, I am storing mail addresses. These addresses may be used by the system to throw mails to the recipients. It is also important to say that these mail addresses have expiration time.
But the critical point is trustness: for this…

Creasixtine
- 740
- 3
- 11
- 33
0
votes
2 answers
Having 3rd party (third party) cookies disabled, how is it possible that youtube infers my identity from me being logged in to gmail?
Having third-party (3rd party) cookies disabled
remove all cookies
login to gmail.com
visit youtube.com without logging in
and wonder how is it that youtube.com knows your gmail identity ??
Can anyone explain how this is achieved technically…

mike8394
- 1
- 3
0
votes
1 answer
Multitasking checking proxies
I wrote that little program:
string sciezka = "http://proxyjudge.hell-spy.de/";
foreach(var ip in listBox1.Items)
{
////////////////// CHANGES IP:PORT TO WEBPROXY HOST,PORT
string host=null;
…

globus25
- 11
- 1
0
votes
0 answers
Protection against idenity extraction from other fields
I'm looking for a way to protect the identity of people in my SQL database.
The database has rows containing an unique hash that represents a person and personal data about this person. The idea is that certain personal/medical data is hashed so…

Joe Harrison
- 105
- 1
- 1
- 8
0
votes
2 answers
Need to hide some fields for one variable, SAS/SQL
I need to give a report to a group of people summarizing each persons information, but only revealing the name of the person each report is going to.
What I have is:
Alice 4 15% 8 20%
Bob 8 30% 6 15%
Carol 4 15%…

S Cross
- 17
- 5
0
votes
1 answer
Checking proxy anonymity in Java
I need to determine level of proxy anonymity. I use following php script for detection:

Serhii Tereshchenko
- 197
- 6
- 16
0
votes
1 answer
How to check Proxy headers to check anonymity?
I'm trying to determine high anonymity proxies. Also called private/elite proxies. From a forum I've read this:
High anonymity Servers don't send HTTP_X_FORWARDED_FOR, HTTP_VIA and
HTTP_PROXY_CONNECTION variables. Host doesn't even know you are…

Jeflopo
- 2,192
- 4
- 34
- 46
0
votes
1 answer
How can I implement IP anonymity in my application? Is there an open source API for this?
I was thinking about two options:
Tor
Mix
But I don't know how to include any of this in my application.
I'm building a protocol for transfering small files (1 to 5 MB) and I want to hide the sender's IP. I will be building a native…

Cacho Santa
- 6,846
- 6
- 41
- 73
-1
votes
1 answer
Google Analytics Tracking across Websites: Privacy Issue
I have been reading up on how google analytics work. So this is my understanding:
Google analytics gives JavaScript code to publishers which publishers inserts in his webpage. When user visits that page, data is collected and reported to google…

user3834119
- 411
- 9
- 21
-1
votes
1 answer
VMWare machine - computer security and privacy?
I'm running a virtual machine on my computer (a Win XP machine in VMWare Player 5.0.1).
My computer, and my network, contain very sensitive data I do not which to expose to the XP machine.
Can I be confident that there is virtually no way for…

user689881
- 57
- 1
- 8
-2
votes
1 answer
Different TOR IPs at http/https
I make requests over TOR to the same website but over different protocols:
http://wtfismyip.com/text
and
https://wtfismyip.com/text
and sometimes get different exit IPs. Can anybody explain why is this so?
Maybe some TOR relays does not support…

skavans
- 374
- 3
- 18
-3
votes
1 answer
Can you provide no knowledge SaaS, if server only serves requests with a VPN/Tor IP address?
to protect users you would reject serving requests originating from non-VPN/Tor IP addresses.
how can you get and keep updated a list of
the Top/most secure VPN providers's IP addresses? (others won't be approved by/work with the service)
Tor exit…

Wis
- 484
- 7
- 22