How is the confidentiality of user data ensured?
If in a few words, there are an infinite number of ways to build files and algorithms provide only general guidelines. The user chooses a specific way of rewriting the information, and no one but him or a person to whom the user has communicated the information about the rewriting rules can access the protected information.
It sounds good. I think it can really prevent the system from a cyberattack.