Patterns — hide
Added-noise measurement obfuscation
Add some noise to service operation measurements, but make it cancel itself in the long-term
Encrypt, aggregate and decrypt at different places.
This pattern aggregates multiple entities into a set, such that they cannot be distinguished anymore.
Anonymous Reputation-based Blacklisting
Get rid of troublemakers without even knowing who they are.
Attribute Based Credentials
Attribute Based Credentials (ABC) are a form of authentication mechanism that allows to flexibly and selectively authenticate different attributes about an entity without revealing additional information about the entity (zero-knowledge property).
Encryption with user-managed keys
Use encryption in such a way that the service provider cannot decrypt the user's information because the user manages the keys.
This pattern provides unlinkability between senders and receivers by encapsulating the data in different layers of encryption, limiting the knowledge of each node along the delivery path.
Hide the identity by using a pseudonym and ensure a pseudonymous identity that can not be linked with a real identity during online interactions.
A messaging service is enhanced by using a trusted third party to exchange the identifiers of the communication partners by pseudonyms.
Trustworthy Privacy Plug-in
Aggregate usage records at the user side in a trustworthy manner.
Use of dummies
This pattern hides the actions taken by a user by adding fake actions that are indistinguishable from real.