Glossary

Privacy terms glossary

Plain-language explanations for encryption, tracking, compliance, and security concepts.

10 terms
🔐

It's like whispering a secret that only your friend can hear — not even the phone or app knows what you said.

zero knowledge metadata vpn
🧬

Fingerprinting

Tracking

It's like someone knowing it's you just by the way you walk and dress — even if you didn’t say your name.

cookies metadata privacy browsers
🧯

Kill Switch

Network

It’s like an emergency brake that stops your internet so your real identity doesn’t leak out.

vpn ip leak tor network
📦

Metadata

Tracking

It's like the envelope of a letter — it shows who sent it, who got it, and when, but not what’s inside.

end to end encryption fingerprinting
🧾

Open Source

Software

It’s like sharing a recipe — everyone can see how it’s made, use it, or suggest improvements.

zero knowledge federated self hosted
🛡️

Secure Enclave

Hardware

It's like a safe hidden inside your phone, with its own lock, that even hackers can't open.

encryption biometric authentication
🏠

Self-Hosted

Software

It’s like cooking your own food at home instead of going to a restaurant — you have full control.

open source federated
🧅

Tor Network

Network

It’s like sending a letter through three friends before it reaches someone — no one knows where it came from.

vpn privacy browser onion routing
🌐

VPN

Network

It's like sending all your internet traffic through a secret tunnel that hides where you're going.

tor network kill switch ip address
🧠

Zero-Knowledge

Encryption

It's like putting something in a box and locking it. The company stores the box, but doesn't have the key.

encryption end to end encryption