Pseudonymous browsing mode
摘要:
Various examples are directed to computer-implemented systems and methods for providing a pseudonymous browsing mode. A method includes receiving, by a processor of a computer, input from a user requesting a level of anonymity for a session on an application or website, where the level of anonymity is between open browsing and completely incognito browsing. The processor programs an avatar configured to provide the level of anonymity to an identity of the user and data generated by the user based on the received input. The processor uses the avatar to control an amount of data shared by the user with the application or website to provide the level of anonymity to an identity of the user and data generated by the user.
信息查询
0/0