Patterns — hide
-
Encryption with user-managed keys
Use encryption in such a way that the service provider cannot decrypt the user's information because the user manages the keys.
-
Use of dummies
This pattern hides the actions taken by a user by adding fake actions that are indistinguishable from real.
-
Pseudonymous Messaging
A messaging service is enhanced by using a trusted third party to exchange the identifiers of the communication partners by pseudonyms.
-
Onion Routing
This pattern provides unlinkability between senders and receivers by encapsulating the data in different layers of encryption, limiting the knowledge of each node along the delivery path.
-
Psuedonymous Identity
Hide the identity by using a pseudonym and ensure a pseudonymous identity that can not be linked with a real identity during online interactions.
-
Aggregation Gateway
Encrypt, aggregate and decrypt at different places.
-
Anonymous Reputation-based Blacklisting
Get rid of troublemakers without even knowing who they are.
-
Added-noise measurement obfuscation
Add some noise to service operation measurements, but make it cancel itself in the long-term
-
Attribute Based Credentials
Attribute Based Credentials (ABC) are a form of authentication mechanism that allows to flexibly and selectively authenticate different attributes about an entity without revealing additional information about the entity (zero-knowledge property).
-
Trustworthy Privacy Plug-in
Aggregate usage records at the user side in a trustworthy manner.
-
Anonymity Set
This pattern aggregates multiple entities into a set, such that they cannot be distinguished anymore.