📖 Privacy & Security Glossary

Understand privacy terms in plain English

🔍
247
Total Terms
5
Categories
150+
Examples
A

Terms starting with A

(15 terms)

AES (Advanced Encryption Standard)

SECURITY

The gold standard encryption algorithm used worldwide to protect sensitive data. AES uses 128, 192, or 256-bit keys, with AES-256 being virtually unbreakable with current technology.

Example: When you use a VPN, your data is typically encrypted with AES-256, the same encryption used by governments and militaries.

Anonymous Browsing

PRIVACY

Browsing the internet without revealing your identity, IP address, or personal information. This involves using tools like Tor Browser, VPNs, and privacy-focused browsers to hide your digital footprint.

Example: Using Tor Browser routes your traffic through multiple servers, making it nearly impossible to trace back to you.

API (Application Programming Interface)

NETWORK

A set of rules that allows different software applications to communicate with each other. APIs can be a privacy concern when they share your data between services without your explicit knowledge.

Example: When you log into a website using "Sign in with Google," that site uses Google's API to verify your identity.
B

Terms starting with B

(12 terms)

Backdoor

SECURITY

A hidden method of bypassing normal authentication or encryption in a computer system. Backdoors can be intentionally built by developers or created by hackers. They pose significant security and privacy risks.

Example: Some governments pressure tech companies to install backdoors in encryption software, which weakens security for everyone.

Browser Fingerprinting

PRIVACY

A tracking technique that collects information about your browser and device to create a unique "fingerprint" that can identify you across websites, even without cookies. Includes data like screen resolution, installed fonts, and browser plugins.

Example: Even in incognito mode, websites can track you by combining your screen size (1920x1080), timezone (EST), and installed fonts to create a unique identifier.

Bitcoin

CRYPTO

The first and most well-known cryptocurrency. Contrary to popular belief, Bitcoin is NOT anonymous - all transactions are recorded on a public blockchain. It's pseudonymous, meaning addresses aren't directly tied to names but can often be traced.

Example: If you buy Bitcoin on Coinbase with your real name, then send it to another address, that transaction can be traced back to you.
C

Terms starting with C

(18 terms)

Cookie

PRIVACY

Small text files stored on your device by websites to remember information about you. While some cookies are helpful (keeping you logged in), others track your behavior across multiple sites for advertising purposes.

Example: Third-party cookies from Facebook can track which websites you visit, even if you're not on Facebook at the time.

Cryptography

SECURITY

The science of protecting information by transforming it into an unreadable format. Modern cryptography is the foundation of all digital privacy and security, from secure messaging to online banking.

Example: When you send a WhatsApp message, cryptography scrambles it so only the recipient can read it, not even WhatsApp itself.
D

Terms starting with D

(14 terms)

Data Broker

PRIVACY

Companies that collect, analyze, and sell your personal information to other businesses. They gather data from public records, online activities, purchases, and social media to create detailed profiles sold to marketers, employers, and even scammers.

Example: Spokeo, Whitepages, and BeenVerified compile your address history, phone numbers, relatives, and estimated income, then sell this information for as little as $1.

DNS (Domain Name System)

NETWORK

The internet's phone book that translates website names (like google.com) into IP addresses. Your ISP can see every website you visit through DNS requests, making it a major privacy concern.

Example: When you type "facebook.com," your device asks a DNS server "What's Facebook's IP address?" Your ISP sees and logs this request.

Digital Footprint

PRIVACY

The trail of data you leave behind when using the internet. Includes everything from social media posts and online purchases to IP addresses and search history. This footprint is permanent and can reveal intimate details about your life.

Example: Your digital footprint might include: 10,000 Google searches, 50,000 Facebook likes, 100,000 location data points, and millions of website visits.
E

Terms starting with E

(11 terms)

End-to-End Encryption (E2EE)

SECURITY

A communication system where only the communicating users can read messages. The service provider, government agencies, and hackers cannot access the content, even if they intercept it.

Example: Signal uses E2EE, meaning if the FBI demanded your messages from Signal, they couldn't provide them because Signal doesn't have the decryption keys.

Encryption

SECURITY

The process of converting readable data (plaintext) into an unreadable format (ciphertext) using mathematical algorithms. Only someone with the correct key can decrypt and read the original data. The foundation of digital privacy.

Example: "Hello World" encrypted might look like "Khoor Zruog" (simple Caesar cipher) or "aGVsbG8gd29ybGQ=" (Base64 encoding).

⚡ Quick Reference

🔒 Privacy Essentials

⚠️ Threats to Know

✅ Best Practices

📚 Ready to Level Up Your Privacy Knowledge?

Take our privacy assessment to see how well you understand these concepts

Take Privacy Assessment → Browse Privacy Guides →