How is the confidentiality of user data ensured in the service?
Well, there are an infinite number of ways to build files and algorithms. The user chooses a specific way of rewriting the information, and no one but him or a person to whom the user has communicated the information about the rewriting rules can access the protected information.