Patterns — hide
Encryption with user-managed keys
Use encryption in such a way that the service provider cannot decrypt the user's information because the user manages the keys.
Use of dummies
This pattern hides the actions taken by a user by adding fake actions that are indistinguishable from real.
A messaging service is enhanced by using a trusted third party to exchange the identifiers of the communication partners by pseudonyms.
This pattern provides unlinkability between senders and receivers by encapsulating the data in different layers of encryption, limiting the knowledge of each node along the delivery path.
Hide the identity by using a pseudonym and ensure a pseudonymous identity that can not be linked with a real identity during online interactions.
Encrypt, aggregate and decrypt at different places.
Anonymous Reputation-based Blacklisting
Get rid of troublemakers without even knowing who they are.
Added-noise measurement obfuscation
Add some noise to service operation measurements, but make it cancel itself in the long-term
Attribute Based Credentials
Attribute Based Credentials (ABC) are a form of authentication mechanism that allows to flexibly and selectively authenticate different attributes about an entity without revealing additional information about the entity (zero-knowledge property).
Trustworthy Privacy Plug-in
Aggregate usage records at the user side in a trustworthy manner.
This pattern aggregates multiple entities into a set, such that they cannot be distinguished anymore.