Questions tagged [anonymity]

Anonymity is the practice of utilizing systems and methods which protect identity. Used for questions about anonymity and data anonymization.

46 questions
0
votes
0 answers

Shuffling as anonymization technique for public data

Shuffling has been approved as a data de-identifcation technique by the EU Protection Board in Opinion on Anonymisation Techniques, 05/2014”. However, there has been very little discussion of appropriate use cases and risks. Talend, Informatica,…
Brad Schoening
  • 1,281
  • 6
  • 22
0
votes
1 answer

Database anonymization : Using additive noise

I want to do an experiment involving the use of additive noise for protecting a database from inference attacks. My database should begin by generating a specific list of values that have a mean of 25, Then I will anonymize these values by adding a…
sna
  • 1
  • 2
0
votes
1 answer

How to set firefox to not share information with web sites (browser version, screen resolution, OS, etc.)?

so, does anybody knows how to turn off information sharing? This is the kind of information i don't wish to share with websites: Thanks!
Murad Alm.
  • 79
  • 9
0
votes
1 answer

Crypting mail addresses - funny design problem

In my web project, I am storing mail addresses. These addresses may be used by the system to throw mails to the recipients. It is also important to say that these mail addresses have expiration time. But the critical point is trustness: for this…
Creasixtine
  • 740
  • 3
  • 11
  • 33
0
votes
2 answers

Having 3rd party (third party) cookies disabled, how is it possible that youtube infers my identity from me being logged in to gmail?

Having third-party (3rd party) cookies disabled remove all cookies login to gmail.com visit youtube.com without logging in and wonder how is it that youtube.com knows your gmail identity ?? Can anyone explain how this is achieved technically…
mike8394
  • 1
  • 3
0
votes
1 answer

Multitasking checking proxies

I wrote that little program: string sciezka = "http://proxyjudge.hell-spy.de/"; foreach(var ip in listBox1.Items) { ////////////////// CHANGES IP:PORT TO WEBPROXY HOST,PORT string host=null; …
globus25
  • 11
  • 1
0
votes
0 answers

Protection against idenity extraction from other fields

I'm looking for a way to protect the identity of people in my SQL database. The database has rows containing an unique hash that represents a person and personal data about this person. The idea is that certain personal/medical data is hashed so…
Joe Harrison
  • 105
  • 1
  • 1
  • 8
0
votes
2 answers

Need to hide some fields for one variable, SAS/SQL

I need to give a report to a group of people summarizing each persons information, but only revealing the name of the person each report is going to. What I have is: Alice 4 15% 8 20% Bob 8 30% 6 15% Carol 4 15%…
S Cross
  • 17
  • 5
0
votes
1 answer

Checking proxy anonymity in Java

I need to determine level of proxy anonymity. I use following php script for detection:
0
votes
1 answer

How to check Proxy headers to check anonymity?

I'm trying to determine high anonymity proxies. Also called private/elite proxies. From a forum I've read this: High anonymity Servers don't send HTTP_X_FORWARDED_FOR, HTTP_VIA and HTTP_PROXY_CONNECTION variables. Host doesn't even know you are…
Jeflopo
  • 2,192
  • 4
  • 34
  • 46
0
votes
1 answer

How can I implement IP anonymity in my application? Is there an open source API for this?

I was thinking about two options: Tor Mix But I don't know how to include any of this in my application. I'm building a protocol for transfering small files (1 to 5 MB) and I want to hide the sender's IP. I will be building a native…
Cacho Santa
  • 6,846
  • 6
  • 41
  • 73
-1
votes
1 answer

Google Analytics Tracking across Websites: Privacy Issue

I have been reading up on how google analytics work. So this is my understanding: Google analytics gives JavaScript code to publishers which publishers inserts in his webpage. When user visits that page, data is collected and reported to google…
-1
votes
1 answer

VMWare machine - computer security and privacy?

I'm running a virtual machine on my computer (a Win XP machine in VMWare Player 5.0.1). My computer, and my network, contain very sensitive data I do not which to expose to the XP machine. Can I be confident that there is virtually no way for…
-2
votes
1 answer

Different TOR IPs at http/https

I make requests over TOR to the same website but over different protocols: http://wtfismyip.com/text and https://wtfismyip.com/text and sometimes get different exit IPs. Can anybody explain why is this so? Maybe some TOR relays does not support…
skavans
  • 374
  • 3
  • 18
-3
votes
1 answer

Can you provide no knowledge SaaS, if server only serves requests with a VPN/Tor IP address?

to protect users you would reject serving requests originating from non-VPN/Tor IP addresses. how can you get and keep updated a list of the Top/most secure VPN providers's IP addresses? (others won't be approved by/work with the service) Tor exit…
Wis
  • 484
  • 7
  • 22