Understand privacy terms in plain English
Virtual Private Network - Encrypts your internet connection and hides your IP address
Only sender and recipient can read messages - not even the service provider
Service provider has no access to your data or passwords
Operational Security - Practices to protect sensitive information
The gold standard encryption algorithm used worldwide to protect sensitive data. AES uses 128, 192, or 256-bit keys, with AES-256 being virtually unbreakable with current technology.
Browsing the internet without revealing your identity, IP address, or personal information. This involves using tools like Tor Browser, VPNs, and privacy-focused browsers to hide your digital footprint.
A set of rules that allows different software applications to communicate with each other. APIs can be a privacy concern when they share your data between services without your explicit knowledge.
A hidden method of bypassing normal authentication or encryption in a computer system. Backdoors can be intentionally built by developers or created by hackers. They pose significant security and privacy risks.
A tracking technique that collects information about your browser and device to create a unique "fingerprint" that can identify you across websites, even without cookies. Includes data like screen resolution, installed fonts, and browser plugins.
The first and most well-known cryptocurrency. Contrary to popular belief, Bitcoin is NOT anonymous - all transactions are recorded on a public blockchain. It's pseudonymous, meaning addresses aren't directly tied to names but can often be traced.
Small text files stored on your device by websites to remember information about you. While some cookies are helpful (keeping you logged in), others track your behavior across multiple sites for advertising purposes.
The science of protecting information by transforming it into an unreadable format. Modern cryptography is the foundation of all digital privacy and security, from secure messaging to online banking.
Companies that collect, analyze, and sell your personal information to other businesses. They gather data from public records, online activities, purchases, and social media to create detailed profiles sold to marketers, employers, and even scammers.
The internet's phone book that translates website names (like google.com) into IP addresses. Your ISP can see every website you visit through DNS requests, making it a major privacy concern.
The trail of data you leave behind when using the internet. Includes everything from social media posts and online purchases to IP addresses and search history. This footprint is permanent and can reveal intimate details about your life.
A communication system where only the communicating users can read messages. The service provider, government agencies, and hackers cannot access the content, even if they intercept it.
The process of converting readable data (plaintext) into an unreadable format (ciphertext) using mathematical algorithms. Only someone with the correct key can decrypt and read the original data. The foundation of digital privacy.
Take our privacy assessment to see how well you understand these concepts