Acoustic Exchange supports standard hashing algorithms as a way to protect the privacy of personally identifiable information and descriptive attributes.
During endpoint registration, a source endpoint can specify the hashing algorithm that it applies to identity and attribute data that it passes through Acoustic Exchange. A destination endpoint can specify the hashing algorithm that it requires for incoming data.
Acoustic Exchange can accept event, identity, and attribute data that is already hashed by a source endpoint. Acoustic Exchange passes the hashed data to destination endpoints. To match the incoming hashed values, the destination endpoint must be able to encode data with the same hashing algorithm that was applied by the source endpoint.
Acoustic Exchange can also hash event, identity, and attribute data that is not hashed by a source endpoint. The destination endpoint must specify the hashing algorithm that it requires.
Acoustic Exchange supports the following hashing algorithms:
- MD5
- SHA1
- SHA256
- EMAIL_SHA256
- PHONE_SHA256