Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

sounds interesting, can you elaborate a bit?


For each piece of PI/PII data, generate a mapping in a table of that piece to a secure random number, and store the generated random number in place of the personal data, and use that in the log.

Then, if deletion is required, simply erase the row that holds the mapping.

And finally, be sure to not store that mapping table in the same place as your backups or your logs.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: