Privacy basics

  • Privacy basics
Virtual private networks (VPNs) are popular because they keep what you do on the internet private, help defeat censorship, and allow you to watch your favorite streaming content securely.  Under most circumstances, a VPN will slightly slow down your
  • Privacy basics
A contraction of “keystroke logger”, a keylogger is either a piece of software or a hardware device that records input from your device’s keyboard. Although not strictly part of the definition, keylogger software can also often record video and/or au
  • Privacy basics
This artcile was updated and refreshed November 2023. We discuss how to change the IP address of your Windows 10 or Windows 11 device. This doesn’t change your IP address on the internet, although we’ll look at that as well.  * Changing your IP ad
  • Privacy basics
A kill switch is a security feature that protects your privacy. It ensures that you don’t connect to the internet thinking you’re protected by a VPN when you aren’t.  When you use a virtual private network (VPN), your device connects to VPN server r
  • Privacy basics
A guest network is a separate WiFi network within your home or office network designed specifically for your guests or customers to use.  Although run from the same router (which may also be your modem), a guest network operates as an entirely separ
  • Privacy basics
Before WiFi, you had to connect your internet-capable device to a router via an Ethernet cable. The router then connected to a modem, which connected your device to the internet. Routers and modems are so often housed in the same device, that the ter
  • Privacy basics
Tor Browser is a privacy-focused browser that lets you navigate the internet without anyone monitoring your activity or identifying you. It relies on the Tor anonymity network to route your internet traffic through multiple random servers before conn
  • Privacy basics
Every device that connects to a network does so through a network interface controller (NIC). Devices that can connect to multiple networks will have a separate NIC for each connection they support. For example, a laptop that supports WiFi, Ethernet
  • Privacy basics
Hackers are always looking for ways to break through the security systems that defend your devices and data from criminals. From web browsers to operating systems to chat apps, any piece of software is a potential target. It’s a constant game of cat
  • Privacy basics
The Invisible Internet Project (I2P) is an open-source, decentralized anonymizing network built on similar principles to Tor. Unlike Tor, which was primarily designed to allow anonymous browsing of the regular internet (but can also be used as a dark
  • Privacy basics
Internet cookies, often called website cookies, computer cookies, or just cookies, are small text files that websites store on your computer or device when you visit them. These files contain data that websites use to remember and track information a