Privacy & Security Glossary
Your comprehensive guide to privacy and security terminology. From VPN concepts to encryption terms, understand the language of digital privacy and security.
VPN Terms
VPN (Virtual Private Network)
A service that creates a secure, encrypted connection between your device and the internet, protecting your online privacy and allowing you to access content from different locations.
Kill Switch
A VPN feature that automatically disconnects your internet connection if the VPN connection drops, preventing your real IP address from being exposed.
Split Tunneling
A VPN feature that allows you to choose which apps or websites use the VPN connection while others use your regular internet connection.
No-Logs Policy
A VPN provider's commitment to not collect, store, or share your online activity data, ensuring your privacy is protected.
Encryption Terms
AES-256
Advanced Encryption Standard with 256-bit key length, considered the gold standard for data encryption and widely used by VPN services.
End-to-End Encryption
A security method where only the communicating users can read the messages, preventing third parties from accessing the data.
Public Key Infrastructure (PKI)
A framework for managing digital certificates and public-key encryption, used to secure communications and verify identities.
Privacy Terms
IP Address
A unique numerical identifier assigned to your device on the internet, which can reveal your location and be used for tracking.
DNS (Domain Name System)
The system that translates domain names into IP addresses. DNS queries can reveal your browsing history to your internet service provider.
Browser Fingerprinting
A tracking technique that identifies users based on their browser configuration, screen resolution, installed fonts, and other unique characteristics.
Cookies
Small text files stored on your device by websites to remember your preferences, login status, and track your browsing behavior.
Security Terms
Two-Factor Authentication (2FA)
A security method that requires two forms of identification to access an account, typically a password and a temporary code sent to your phone.
Password Manager
A software application that generates, stores, and manages passwords for your online accounts, helping you maintain strong, unique passwords.
Zero-Knowledge Architecture
A security model where the service provider cannot access your encrypted data, even if compelled by law enforcement or hackers.
Phishing
A cyber attack where attackers impersonate legitimate organizations to steal sensitive information like passwords and credit card numbers.
Digital Freedom Terms
Net Neutrality
The principle that internet service providers should treat all online content equally, without favoring or blocking specific websites or services.
Censorship
The suppression or prohibition of speech, public communication, or other information that may be considered objectionable, harmful, or sensitive.
Digital Rights
Human rights that allow individuals to access, use, create, and publish digital media or to access and use computers, other electronic devices, and communications networks.
Stay Protected
Now that you understand the terminology, take action to protect your privacy and security.