Main

type

5 (blog/news article)

status

21 (imported old-v2, waiting for another import)

review version

1

cleanup version

0

pending deletion

0 (-)

created at

2026-01-01 21:32:12

updated at

2026-01-01 21:32:12

pol page id

3422822281

pol status

0

pol hosts ticketing

pol hosts ecommerce

pol hosts finance

pol hosts crypto

pol hosts leak

pol hosts devel

pol hosts ugc

pol hosts klim

pol hosts builders

pol hosts self subdomains

pol hosts other subdomains

pol hosts other domains

pol updated

1768047636

Address

url

https://dgymbook.com/help/articles/what-encryption-methods-are-employed-for-sensitive-data

url length

90

url crc

29202

url crc32

1262580242

location type

1 (url matches target location, page_location is empty)

canonical status

30 (canonical url is different, page_canonical_page_id points to it)

canonical page id

3610540746

Source

domain id

6129948

domain tld

2211

domain parts

2

originating warc id

6610118

originating url

source type

11 (CommonCrawl)

Server response

server ip

3.162.125.75

Publication date

2025-07-20 10:30:19

Fetch attempts

0

Original html size

27973

Normalized and saved size

10463

Content

title

What encryption methods are employed for sensitive data?

excerpt

content

author

Sehal Sein

updated

1768047636

Text analysis

block type

0

extracted fields

15

extracted bits

featured image
image author
article author
title

detected location

0

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

paywall score

0

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

248

text words

45

text unique words

29

text lines

12

text sentences

5

text paragraphs

0

text words per sentence

9

text matched phrases

3

text matched dictionaries

2