This is a dedicated watch page for a single video.
An engineer needs to protect confidential information, but doesn't want to go through the complexity of encryption. Instead, the engineer is going to use a technique in which data is replaced by an arbitrary value generated by an application. The application is then able to map the arbitrary value back to the original value. What is this technique known as?