Skip to main content
GoogleExitPlan

Privacy Glossary

Understanding privacy and security terminology.

2

2FA
Two-Factor Authentication. A security method requiring two different types of verification to access an account, typically a password plus a code from your phone.

A

Ad Tracker
Scripts or pixels embedded in websites to follow your browsing behavior across the internet for advertising purposes.

B

Browser Fingerprinting
A tracking technique that identifies users by collecting unique characteristics of their browser and device, such as screen resolution, fonts, and plugins.

C

Cookie
A small file stored in your browser by websites to remember information about you. Can be used for legitimate purposes or tracking.

D

Data Broker
Companies that collect, aggregate, and sell personal information about individuals to advertisers and other businesses.
Data Minimization
The principle of collecting only the minimum amount of personal data necessary for a specific purpose.
DNS
Domain Name System. The internet's phone book that translates website names into IP addresses. Your DNS provider can see which sites you visit.

E

E2EE
End-to-End Encryption. A communication method where only the sender and recipient can read messages, not even the service provider.
Encryption
The process of encoding data so that only authorized parties can access it. Essential for protecting sensitive information.

F

FOSS
Free and Open Source Software. Software whose source code is publicly available and can be modified and distributed freely.

G

GDPR
General Data Protection Regulation. EU law that protects personal data and privacy of EU citizens.
Geofencing
Technology that creates virtual boundaries to trigger actions when a device enters or exits an area. Used for targeted advertising.

I

IP Address
A unique number assigned to your device on the internet. Can reveal your approximate location and internet provider.

K

Keylogger
Malicious software that records everything you type, potentially capturing passwords and sensitive information.

M

Malware
Malicious software designed to harm, exploit, or otherwise compromise computer systems.
Metadata
Data about data. For example, email metadata includes sender, recipient, and timestamp—even if the content is encrypted.
MITM
Man-in-the-Middle attack. When an attacker secretly intercepts and relays communications between two parties.

O

Open Source
Software with publicly available source code that anyone can inspect, modify, and distribute.

P

PGP
Pretty Good Privacy. An encryption program for secure email communication and file encryption.
Phishing
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity, often via email.
Privacy Policy
A legal document explaining how a company collects, uses, and protects your personal data.
Proxy
An intermediary server that forwards your internet requests, hiding your real IP address from websites.

R

Ransomware
Malware that encrypts your files and demands payment for the decryption key.

S

Self-Hosting
Running services on your own server instead of using third-party providers, giving you full control over your data.
SSL/TLS
Secure Sockets Layer/Transport Layer Security. Protocols that encrypt data transmitted between your browser and websites (the padlock icon).
Surveillance Capitalism
An economic system where personal data is commodified for profit through behavioral prediction and modification.

T

Third-Party Cookies
Cookies set by domains other than the website you're visiting, primarily used for cross-site tracking.
TOTP
Time-based One-Time Password. A temporary code generated by authentication apps for 2FA that changes every 30 seconds.
Tor
The Onion Router. A network that anonymizes internet traffic by routing it through multiple encrypted layers.

V

VPN
Virtual Private Network. Encrypts your internet connection and masks your IP address by routing traffic through a remote server.

Z

Zero-Knowledge
A security architecture where the service provider cannot access your data, even if they wanted to or were legally compelled.