Anonymity is the practice of utilizing systems and methods which protect identity. Used for questions about anonymity and data anonymization.
Questions tagged [anonymity]
46 questions
15
votes
2 answers
Spoofing / faking screen-resolution?
While browsing the web, I need to fake my screen resolution to websites I'm viewing but keep my viewport the same (Chrome's or FF's emulating doesn't solve my problem).
For instance, if I go to http://www.whatismyscreenresolution.com/ from a browser…

Poky
- 151
- 1
- 1
- 5
11
votes
2 answers
Anonymizing IPv6 addresses
As required by law in several countries we anonymize IP-addresses of our users in our log files. Using IPv4 we regularly just anonymize the two last bytes, eg. instead of 255.255.255.255 we log 255.255.\*.\*
What algorithm would you recommend to…

tec
- 505
- 3
- 13
10
votes
3 answers
Personally identifying information (of the programmer) in .NET Assemblies
When going through some of my applications in the past, I have noticed that compiled into the assembly is information such as where my project is, my username (which happened to be my full name, not my online handle) in Windows, and honestly I'm not…

Brett Allen
- 5,297
- 5
- 32
- 62
10
votes
3 answers
Do runnable jars (via Eclipse) contain tracking information?
Lets say I'm writing Java code in Eclipse and then save it as a runnable .jar file. The code is 100% self-written, so no imports from other sources.
Does anything in the .jar file (file headers, ..) hold private data about my PC or my Eclipse…

Tom
- 503
- 2
- 13
7
votes
1 answer
Is hosting on Dropbox private, anonymous?
I've seen others host images on Dropbox. Is there a way to find out the user hosting the file?
For example, if I post a Dropbox picture online, can any user find my name or username? Can link it to other uploads?
Thanks

Noah
- 4,601
- 9
- 39
- 52
7
votes
2 answers
Anonymise a local git repository?
I have a local git repository that I've done quite a bit of work on, with a number of commits that I'd like to retain. Unfortunately, while the code is reasonable reusable, I included some sensitive data (database names/user/passwords) in a very…

naught101
- 18,687
- 19
- 90
- 138
2
votes
2 answers
How would you implement anonymous authentication?
I'm building a web-based app centered around security, privacy, and anonymity. One of the key principals of the app is that users can store sensitive data anonymously.
As a result, I expect to outsource system authentication entirely, preferably…

EAMann
- 4,128
- 2
- 29
- 48
2
votes
2 answers
How to replace values in Pandas column with random numbers per unique values (random categorical)?
I have a df with a column that looks like this:
id
11
22
22
333
33
333
This column is sensitive data. I want to replace each value with any random number but each random number should be maintain the same number across the same IDs.
For…

RustyShackleford
- 3,462
- 9
- 40
- 81
2
votes
2 answers
How to support anonymity on a website?
I'm making a website (using PHP, JavaScript and MySQL) with a voting system which allows people to vote anonymously but just only once.
It means that my system have to know who voted (because I have to check if the user already voted or not)but I…

Bakayaro
- 120
- 8
1
vote
1 answer
pandas frequency table with missing values
I try to calculate the number of equal rows in a pandas dataframe (i.e. a frequency table)
which is used to calculate the k-anonymity of a dataset
I have a special requirement regarding the counting of missing values : A missing value should count…

Raphael Roth
- 26,751
- 15
- 88
- 145
1
vote
0 answers
Group signature without anonymity of the members
I'm looking for a crypto digital signature algorithm with the same properties as a group/ring-signature (you can always determine that the signer belong to a specific set), but without the anonymity of the signer.
In other words I'm looking for an…

Federico Bellini
- 365
- 1
- 7
- 18
1
vote
2 answers
How to replace non-duplicated values in columns of csv files by stars("*")?
everybody.I need to anonymize the raw table to make a anonymized table. In another word, I need to replace the non_ duplicated sets with stars.
Actually, I have run this code:
for j in range(len(zz_new)):
for i in range(len(zz)):
…

hiva
- 23
- 4
1
vote
0 answers
How to use use data anonymization with mysql database
I will describe this. “IVM” stands for Intelligent Vacancy Manager which is our system. We are going to use MySQL database and we are going to store extracted data from CVs. It is a web-based application. Let’s say you’re the company.
When a…

Nilushana
- 11
- 3
1
vote
1 answer
Using a VPN with a windows virtual machine (VirtualBox) anonymous enough?
I want to be anonymous enough not to get my host machine hacked/attacked or my real IP address exposed.
So, is using a VPN inside a Windows virtual machine using Oracle VirtualBox enough?
Should I also use a VPN on my host PC too?
Thank you.

ads turk
- 21
- 2
1
vote
1 answer
How to check proxy's anonymity level?
How to check if the proxy have a high anonymity level or a transparent level in Python?
I am writing a script to sort the good proxies but I want to filter only the high anonymity ones (elite proxies).

bibou test
- 35
- 1
- 8