Data Privacy: Difference between revisions
| Line 19: | Line 19: | ||
A [[Virtual Private Network]] (VPN) creates an encrypted tunnel between the user and a remote server operated by the VPN service. All of that user's internet traffic and data are routed through this tunnel. As the traffic exits the VPN server, the true IP address is hidden, masking the user's identity and location.<ref>[https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one What is a VPN and Why you need one, PC Magazine]</ref> | A [[Virtual Private Network]] (VPN) creates an encrypted tunnel between the user and a remote server operated by the VPN service. All of that user's internet traffic and data are routed through this tunnel. As the traffic exits the VPN server, the true IP address is hidden, masking the user's identity and location.<ref>[https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one What is a VPN and Why you need one, PC Magazine]</ref> | ||
===Tor Project=== | ===Tor Project=== | ||
[[The Tor Project]] is a 501(c)(3) nonprofit organization that develops free, open-source software for privacy and freedom online from tracking, surveillance, and censorship. Tor bounces communications around a distributed network of relays run by volunteers worldwide and prevents sites from learning end user's physical location. The Onion Router is a network of servers that connects through a series of virtual tunnels rather than direct connections.<ref>[https://2019.www.torproject.org/about/overview.html.en#overview Overview, Tor Project]</ref> | |||
==Organizations & Groups== | ==Organizations & Groups== | ||