Privacy & Security Glossary
Your comprehensive guide to privacy and security terminology. From VPN concepts to encryption terms, understand the language of digital privacy and security.
VPN Terms
VPN (Virtual Private Network)
A service that creates a secure, encrypted connection between your device and the internet, protecting your online privacy and allowing you to access content from different locations.
Kill Switch
A VPN feature that automatically disconnects your internet connection if the VPN connection drops, preventing your real IP address from being exposed.
Split Tunneling
A VPN feature that allows you to choose which apps or websites use the VPN connection while others use your regular internet connection.
No-Logs Policy
A VPN provider's commitment to not collect, store, or share your online activity data, ensuring your privacy is protected.
Encryption Terms
AES-256
Advanced Encryption Standard with 256-bit key length, considered the gold standard for data encryption and widely used by VPN services.
End-to-End Encryption
A security method where only the communicating users can read the messages, preventing third parties from accessing the data.
Public Key Infrastructure (PKI)
A framework for managing digital certificates and public-key encryption, used to secure communications and verify identities.
Privacy Terms
IP Address
A unique numerical identifier assigned to your device on the internet, which can reveal your location and be used for tracking.
DNS (Domain Name System)
The system that translates domain names into IP addresses. DNS queries can reveal your browsing history to your internet service provider.
Cookies
Small text files stored on your device by websites to remember your preferences and track your browsing activity.
Fingerprinting
A tracking technique that identifies users based on unique characteristics of their device, browser, and system configuration.
Security Terms
Two-Factor Authentication (2FA)
A security method that requires two forms of identification to access an account, typically a password and a temporary code sent to your device.
Zero-Day Vulnerability
A security flaw that is unknown to the software vendor and has no available patch, making it particularly dangerous.
Phishing
A cyber attack where attackers impersonate legitimate organizations to steal sensitive information like passwords and credit card details.
Malware
Malicious software designed to harm devices, steal data, or gain unauthorized access to systems.
Digital Freedom Terms
Net Neutrality
The principle that internet service providers should treat all internet traffic equally, without discrimination or preferential treatment.
Censorship
The suppression or prohibition of speech, public communication, or other information that may be considered objectionable or harmful.
Surveillance Capitalism
A business model where companies collect and monetize personal data for profit, often without explicit user consent.
Digital Rights
Human rights that apply to the digital realm, including privacy, freedom of expression, and access to information.
Stay Protected
Now that you understand the terminology, take action to protect your privacy and security.