개인정보 보호 기본 사항

en
In this article, we look at who can see your internet history when you use WiFi,
what they can see, and why they might do this.

en
- 개인정보 보호 기본 사항
Tor Browser is a powerful privacy tool that lets you browse onion sites and
protect your identity. Here’s how it works.

en
In this article, we look at what a MAC address is and whether it poses a risk to
your privacy or security.

en
Cyberattacks target weak security systems and unsuspecting victims. Learn the
main cyberattack types and how to protect yourself.

en
- 개인정보 보호 기본 사항
The Invisible Internet Project (I2P) is a decentralized anonymizing network
built on similar principles to Tor.

en
- 개인정보 보호 기본 사항
We look at what cookies are and how they are used. Third-party cookies, in
particular, can pose a threat to your online privacy.

en
- 개인정보 보호 기본 사항
We discuss why and how streaming services geoblock content. That is, restrict
content based on your geographic location.

en
- 개인정보 보호 기본 사항
In this article, we discuss DNS — what it is, how it works, and how it impacts
issues such as online privacy and censorship.

en
- 개인정보 보호 기본 사항
VPNs use encryption to create a secure tunnel for your internet traffic. Learn
how VPN tunnels work and why you might want to use them.

en
- 개인정보 보호 기본 사항
A VPN takes over routing your internet connection to the websites you visit, so
it can see what you do on the internet instead of your ISP.

en
- 개인정보 보호 기본 사항
We look at some of the free VPN options available and compare them to commercial
VPN services such as Proton VPN.