Privacy Glossary
Understanding privacy and security terminology.
2
- 2FA
- Two-Factor Authentication. A security method requiring two different types of verification to access an account, typically a password plus a code from your phone.
A
- Ad Tracker
- Scripts or pixels embedded in websites to follow your browsing behavior across the internet for advertising purposes.
B
- Browser Fingerprinting
- A tracking technique that identifies users by collecting unique characteristics of their browser and device, such as screen resolution, fonts, and plugins.
C
- Cookie
- A small file stored in your browser by websites to remember information about you. Can be used for legitimate purposes or tracking.
D
- Data Broker
- Companies that collect, aggregate, and sell personal information about individuals to advertisers and other businesses.
- Data Minimization
- The principle of collecting only the minimum amount of personal data necessary for a specific purpose.
- DNS
- Domain Name System. The internet's phone book that translates website names into IP addresses. Your DNS provider can see which sites you visit.
E
- E2EE
- End-to-End Encryption. A communication method where only the sender and recipient can read messages, not even the service provider.
- Encryption
- The process of encoding data so that only authorized parties can access it. Essential for protecting sensitive information.
F
- FOSS
- Free and Open Source Software. Software whose source code is publicly available and can be modified and distributed freely.
G
- GDPR
- General Data Protection Regulation. EU law that protects personal data and privacy of EU citizens.
- Geofencing
- Technology that creates virtual boundaries to trigger actions when a device enters or exits an area. Used for targeted advertising.
I
- IP Address
- A unique number assigned to your device on the internet. Can reveal your approximate location and internet provider.
K
- Keylogger
- Malicious software that records everything you type, potentially capturing passwords and sensitive information.
M
- Malware
- Malicious software designed to harm, exploit, or otherwise compromise computer systems.
- Metadata
- Data about data. For example, email metadata includes sender, recipient, and timestamp—even if the content is encrypted.
- MITM
- Man-in-the-Middle attack. When an attacker secretly intercepts and relays communications between two parties.
O
- Open Source
- Software with publicly available source code that anyone can inspect, modify, and distribute.
P
- PGP
- Pretty Good Privacy. An encryption program for secure email communication and file encryption.
- Phishing
- Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity, often via email.
- Privacy Policy
- A legal document explaining how a company collects, uses, and protects your personal data.
- Proxy
- An intermediary server that forwards your internet requests, hiding your real IP address from websites.
R
- Ransomware
- Malware that encrypts your files and demands payment for the decryption key.
S
- Self-Hosting
- Running services on your own server instead of using third-party providers, giving you full control over your data.
- SSL/TLS
- Secure Sockets Layer/Transport Layer Security. Protocols that encrypt data transmitted between your browser and websites (the padlock icon).
- Surveillance Capitalism
- An economic system where personal data is commodified for profit through behavioral prediction and modification.
T
- Third-Party Cookies
- Cookies set by domains other than the website you're visiting, primarily used for cross-site tracking.
- TOTP
- Time-based One-Time Password. A temporary code generated by authentication apps for 2FA that changes every 30 seconds.
- Tor
- The Onion Router. A network that anonymizes internet traffic by routing it through multiple encrypted layers.
V
- VPN
- Virtual Private Network. Encrypts your internet connection and masks your IP address by routing traffic through a remote server.
Z
- Zero-Knowledge
- A security architecture where the service provider cannot access your data, even if they wanted to or were legally compelled.