Changes

Jump to navigation Jump to search
no edit summary
Line 14: Line 14:  
==Means and Methods==
 
==Means and Methods==
 
===Privacy Automation===
 
===Privacy Automation===
===Virtual Private Network==
+
===Virtual Private Network===
 
A [[Virtual Private Network]] (VPN) creates an encrypted tunnel between the user and a remote server operated by the VPN service. All of that user's internet traffic and data are routed through this tunnel. As the traffic exits the VPN server, the true IP address is hidden, masking the user's identity and location.<ref>[https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one What is a VPN and Why you need one, PC Magazine]</ref>
 
A [[Virtual Private Network]] (VPN) creates an encrypted tunnel between the user and a remote server operated by the VPN service. All of that user's internet traffic and data are routed through this tunnel. As the traffic exits the VPN server, the true IP address is hidden, masking the user's identity and location.<ref>[https://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one What is a VPN and Why you need one, PC Magazine]</ref>
 
===Tor Project===
 
===Tor Project===
Bureaucrats, Check users, lookupuser, Administrators, translator
14,952

edits

Navigation menu