Module 4 Glossary
Glossary for Module 4
1. Web3
The next generation of the internet, built on blockchain technology, offering decentralization, transparency, and enhanced user control over data.
2. Zero-Knowledge Proof (ZKP)
A cryptographic method allowing one party to prove the truth of a statement without revealing any additional information.
3. Decentralized Identity (DID)
A technology that gives users control over their digital identity without relying on centralized authorities.
4. Confidential Transactions
Technology that conceals transaction details such as amounts and participants, ensuring data confidentiality.
5. Off-chain Payment Channels
Mechanisms that allow transactions to occur off the main blockchain, enhancing privacy and scalability.
6. Secure Multi-Party Computation (MPC)
A protocol enabling multiple parties to analyze data collectively without revealing individual inputs.
7. Homomorphic Encryption
Encryption that allows computations to be performed on encrypted data without decryption, preserving data confidentiality.
8. Smart Contracts
Automated agreements executed via blockchain. Privacy-focused smart contracts use secure environments to protect sensitive data.
9. Decentralized Storage Networks
Distributed data storage networks, such as IPFS, that ensure encryption and authorized access only, reducing reliance on centralized storage providers.
10. Privacy-Focused Browsers
Web browsers like Brave, designed to enhance user privacy by blocking trackers, ads, and reducing data leaks.
11. Encrypted Communication Protocols
Protocols like Whisper that provide encrypted and private communication between network participants.
12. Cyber Hygiene
Practices aimed at maintaining online safety, such as minimizing shared personal information and using secure tools.
13. Privacy vs. Anonymity
Privacy ensures that no one sees your activities but may know your identity, while anonymity hides your identity but may expose your actions.
14. Security
The protection of data against hacking, viruses, and other threats through vulnerability detection, threat blocking, and risk mitigation.
15. Threat Model
A framework for assessing risks and determining the necessary level of protection based on potential threats and user circumstances.
16. VPN (Virtual Private Network)
A tool that encrypts your internet connection, hides your IP address, and provides access to region-blocked content.
17. Ad Blocker
Software that blocks advertisements and trackers to improve privacy and security during web browsing.
18. Private Search Engine
Search engines like DuckDuckGo or Brave Search that do not track users, offering privacy-friendly alternatives to Google.
19. Password Manager
Applications such as Bitwarden or NordPass that securely store and manage passwords for enhanced security.
20. Privacy Analyzer
Tools designed to analyze browser privacy settings and evaluate their level of protection.