id
type
5 (blog/news article)
status
21 (imported old-v2, waiting for another import)
review version
1
cleanup version
0
pending deletion
0 (-)
created at
2026-01-01 21:32:12
updated at
2026-01-01 21:32:12
pol page id
pol status
0
pol hosts ticketing
pol hosts ecommerce
pol hosts finance
pol hosts crypto
pol hosts leak
pol hosts devel
pol hosts ugc
pol hosts klim
pol hosts builders
pol hosts self subdomains
pol hosts other subdomains
pol hosts other domains
pol updated
1768047636
url
https://dgymbook.com/help/articles/what-encryption-methods-are-employed-for-sensitive-data
url length
90
url crc
29202
url crc32
1262580242
location type
1 (url matches target location, page_location is empty)
canonical status
30 (canonical url is different, page_canonical_page_id points to it)
canonical page id
domain id
domain tld
2211
domain parts
2
originating warc id
6610118
originating url
source type
11 (CommonCrawl)
server ip
Publication date
2025-07-20 10:30:19
Fetch attempts
0
Original html size
27973
Normalized and saved size
10463
title
What encryption methods are employed for sensitive data?
excerpt
content
author
Sehal Sein
updated
1768047636
block type
0
extracted fields
15
extracted bits
featured image
image author
article author
title
detected location
0
detected language
1 (English)
category id
SEC and Crypto [en] (228)
index version
2025123101
paywall score
0
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
248
text words
45
text unique words
29
text lines
12
text sentences
5
text paragraphs
0
text words per sentence
9
text matched phrases
3
text matched dictionaries
2
image author
Dgymbook
featured image