Privacy & Security Glossary

Plain-English definitions for the terms used across cybersecurity, privacy, and digital security.

Advanced Persistent Threat (APT)

A sophisticated, long-term cyberattack typically carried out by nation-state actors targeting specific high-value organizations.

Data Broker

A company that collects and sells personal information from public records, social media, surveys, and other sources.

Dark Web

The portion of the internet accessible only through Tor or similar software. Hosts both legitimate privacy tools and illicit activity.

Doxing

Publishing private information about an individual online, typically with malicious intent.

End-to-End Encryption (E2EE)

Encryption where only the communicating parties can read the messages — not the service provider.

Identity Theft

When someone uses your personal information without permission, typically for financial gain.

Multi-Factor Authentication (MFA)

A security method requiring two or more verification factors to access an account.

No-Logs Policy

A VPN provider's commitment to not record users' browsing activity, connection logs, or IP addresses.

OSINT

Open Source Intelligence — collecting and analysing information from publicly available sources.

Phishing

A social engineering attack using deceptive emails or messages to steal credentials or install malware.

Social Engineering

Manipulating people into revealing confidential information or performing actions that compromise security.

Two-Factor Authentication (2FA)

An additional security layer requiring a second form of verification beyond just a password.

VPN

Virtual Private Network — encrypts your internet connection and masks your IP address from websites and your ISP.

Zero-Knowledge Encryption

Encryption where the service provider cannot access or read your data — only you hold the keys.

🚀 Ready to Get Protected?

Find the Right Privacy Protection for Your Life

Our top picks are tested, ranked, and ready. Click below to see our best recommendations.