LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.
Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.
Congratulations. Just read the article... a heck of a good job!!
Cybersecurity & Privacy Senior Consultant e Digital Accelerator na PwC Brasil
2yI've always preferred to completely remove sensitive information of documents and screenshots that I create. Always thought about such techniques, but I, by myself, could never, ever, demonstrate this issue as well as you did. Congrats!!
河南师范大学学生
2yHello, I am an undergraduate student from China. Recently I have been studying your project DEPIX. I am very interested in it, but I would like to ask you some questions. Does your program have any special treatment for your coding method? I have tried different ways to code some text processing, and then run your program, but all failed, so I would like to ask you how to code! Excuse me!
Domein Architect Infrastructuur, aspectgebied security bij Achmea IM&IT
2yReminds me of masked IP addresses and other text in a PDF some 15 years ago: It seemed unreadable because of the black rectangle, just until you select the text underneath and paste it somewhere else... This is still a practice many people use, instead of properly using the Redact functionality.