Data Masking: How it Can be Implemented Correctly | HackerNoon