摘要 |
A mechanism for securing information by hiding identity in a computing device is disclosed. A method includes generating, by a computing device, a dummy profile of the computing device. The dummy profile is a clone of a home profile stored in the computing device and the home profile is assigned to a user authorized to use the computing device. The method also includes altering, based on instructions from the user, the dummy profile to remove data that the user indicates is not to be included in the dummy profile. The method further includes switching a current operating profile of the computing device from the home profile to the dummy profile and executing the computing device in a normal operation mode using the dummy profile.
|