Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There are many proprietary methods which are based on deterministic encryption + obfuscating word distribution, that's what most companies do.

We avoid doing that because of questionable security of such method. Also we tend to publish what we do (stay tuned for Hadoop paper :-)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: