Module 4 Glossary


Glossary for Module 4

1. Web3

The next generation of the internet, built on blockchain technology, offering decentralization, transparency, and enhanced user control over data.


2. Zero-Knowledge Proof (ZKP)

A cryptographic method allowing one party to prove the truth of a statement without revealing any additional information.


3. Decentralized Identity (DID)

A technology that gives users control over their digital identity without relying on centralized authorities.


4. Confidential Transactions

Technology that conceals transaction details such as amounts and participants, ensuring data confidentiality.


5. Off-chain Payment Channels

Mechanisms that allow transactions to occur off the main blockchain, enhancing privacy and scalability.


6. Secure Multi-Party Computation (MPC)

A protocol enabling multiple parties to analyze data collectively without revealing individual inputs.


7. Homomorphic Encryption

Encryption that allows computations to be performed on encrypted data without decryption, preserving data confidentiality.


8. Smart Contracts

Automated agreements executed via blockchain. Privacy-focused smart contracts use secure environments to protect sensitive data.


9. Decentralized Storage Networks

Distributed data storage networks, such as IPFS, that ensure encryption and authorized access only, reducing reliance on centralized storage providers.


10. Privacy-Focused Browsers

Web browsers like Brave, designed to enhance user privacy by blocking trackers, ads, and reducing data leaks.


11. Encrypted Communication Protocols

Protocols like Whisper that provide encrypted and private communication between network participants.


12. Cyber Hygiene

Practices aimed at maintaining online safety, such as minimizing shared personal information and using secure tools.


13. Privacy vs. Anonymity

Privacy ensures that no one sees your activities but may know your identity, while anonymity hides your identity but may expose your actions.


14. Security

The protection of data against hacking, viruses, and other threats through vulnerability detection, threat blocking, and risk mitigation.


15. Threat Model

A framework for assessing risks and determining the necessary level of protection based on potential threats and user circumstances.


16. VPN (Virtual Private Network)

A tool that encrypts your internet connection, hides your IP address, and provides access to region-blocked content.


17. Ad Blocker

Software that blocks advertisements and trackers to improve privacy and security during web browsing.


18. Private Search Engine

Search engines like DuckDuckGo or Brave Search that do not track users, offering privacy-friendly alternatives to Google.


19. Password Manager

Applications such as Bitwarden or NordPass that securely store and manage passwords for enhanced security.


20. Privacy Analyzer

Tools designed to analyze browser privacy settings and evaluate their level of protection.

Complete and Continue