Hotspot Shield Glossary – Explore VPN’s, Online Privacy, and Censorship

VPN and VPN Technology Definitions

Anonymizer
Asynchronous Transfer Mode
authentication
biometrics
broadcast domains
Communications protocol
Content-control software
cryptographic
Datagram Transport Layer Security
DD-WRT
Deep packet inspection
dial-up modem
digital certificates
Dynamic Multipoint Virtual Private Network
edge
encryption
EtherIP (RFC 3378)
Frame Relay
FreeBSD
FreeS/WAN
Generic Routing Encapsulation
Geo-blocking
Host Identity Protocol
Internet Engineering Task Force
Internet privacy
Internet Protocol Security
intranet
IP address
IPsec
IPv4
IPv6
ISSN
L2TPv3
Label Switch Routers
layer 2
Layer 2 Forwarding (L2F)
Layer 2 Forwarding Protocol
leased line
Libreswan
local area network
Mediated VPN
Metro Ethernet
Microsoft Point-to-Point Encryption
Multi-protocol Label Switching
n2n
NetBIOS
Network Address Translation
network sniffer
network topology
network tunnel
OpenConnect
OpenIKED
OpenSSH
Openswan
OpenVPN
OpenWRT
Opportunistic encryption
OSI layer
overlay network
packets
point-to-point
Point-to-Point Protocol
Point-to-Point Tunneling Protocol
port forwarding
PPTP
private network
protocols
proxy servers
RFC 6434
Route Distinguisher
router
Secure Socket Tunneling Protocol
Social VPN
SoftEther VPN
Split tunneling
strongSwan
tcpcrypt
telecommunication carriers
Tinc (protocol)
Transport Layer Security
tunnel
tunneling protocols
two-factor authentication
UDP
UT-VPN
Virtual Private LAN Service
Virtual private server
VTun
wide area network
Wi-Fi
Windows networking
Windows Server 2008
Windows Vista
X.25 Protocol
Amazon Virtual Private Cloud
CAPRI OS

Censorship Definitions

2013 Bengali blog blackout
2013 Singapore cyberattacks
Alternative Informatics Association
Arab Spring
Banhammer
Censorship of the iTunes Store
Censorship of Twitter
Censorship of YouTube
Clean IT Project
Content-control software
Cyber-dissident
CyberPatriot
Cybersecurity Information Sharing Act
Cyberspace Administration of China
Declaration of Internet Freedom
Deep packet inspection
Deletionism and inclusionism in Wikipedia
Don’t Filter Me
Electrohippies
Filter bubble
Format-transforming encryption
Free Internet Act
Geo-blocking
Global Internet Freedom Consortium
Global Network Initiative
HTTP 451
Internet censorship
Internet censorship circumvention
Internet kill switch
Internet police
Internet Ungovernance Forum
Irrepressible .info
Jingjing and Chacha
Just-in-time blocking
Kiwix
Kwangmyong (network)
Lumen (website)
MAFIAAFire Redirector
Move Your Domain Day
National intranet
Network Sovereignty
Project Chanology
Protests against SOPA and PIPA
Psiphon
Scunthorpe problem
Splinternet
The Digital Imprimatur
The Memory Hole (web site)
VPN blocking
Web brigades
Web filtering in schools
Wordfilter
World Day Against Cyber Censorship
World Internet Conference
Worldwide Protests for Free Expression in Bangladesh
Censorship
Act to Restrain Abuses of Players
Bishops’ Ban of 1599
Censor bars
Censorship in the Middle East
Censorship of music
Censorship of student media
Chilling effect
Clandestine literature
Corporate censorship
Criminal speech
Expurgation
Film and Publication Board
Fogging-censorship
Freedom of speech
Freedom of thought
Gag order
Hate speech
Hecklers veto
Media blackout
News embargo
Newspaper theft
Obscenity
Peñabot
Political censorship
Postal censorship
Prior restraint
Prior review
Publication ban
SPEAK FREE Act of 2015
Speech code
Suppression of dissent
Whitewashing in Censorship

Online Security Definitions

2014 Russian hacker password theft
Anonymous visitor tracking
Anti-Spyware Coalition
Automated Certificate Management Environment
Badlock
Bicycle attack
Bug bounty program
CA/Browser Forum
Careto (malware)
CECPQ1
Certificate Authority Security Council
Certificate Transparency
Clickstream
Cloudbric
Computer and Internet Protocol Address Verifier
Cyber hygiene
Cyber spying
Cybergeddon
Cyber-Insurance
CyberPatriot
Deception technology
DNS hijacking
DNS rebinding
DNS spoofing
DNSChanger
Exploit kit
Extensible Threat Management (XTM)
Heartbleed
ICloud leaks of celebrity photos
Inputlog
Internet censorship circumvention
Internet Security Research Group
Internet Storm Center
IP address blocking
IP address spoofing
IP fragmentation attack
IP hijacking
JASBUG
Key ring file
KeyRaider
Keystroke logging
Let’s Encrypt
Movieland
NSA
Physical Security Interoperability Alliance
Piggyback attack
POODLE
Privacy-invasive software
Project Shield
Shadow Network
Shellshock (software bug)
Spyware
Tor (anonymity network)
Transport Layer Security
Trojan horse
Warrant canary

Online Privacy Definitions

Tor2web
TorChat
8chan
BitBlender
Bitcoin Fog
Bitmessage-ch
Black Market Reloaded
Blockchain-info
BTDigg
BuggedPlanet
Chinese dark web
clearnet
Courage Foundation
Cryptocat
Darkode
Debian
Deep Web Radio
DuckDuckGo
Evolution
Facebookcorewwwi-onion
Free Haven
Freedom of the Press Foundation
Grams
KickassTorrents
La Quadrature du Net
Mailpile
Riseup
Russian Anonymous Marketplace
Sci-Hub
SecureDrop
Sheep Marketplace
SIGAINT
Silk Road
Telecomix
The Hub
The Pirate Bay
TheRealDeal
Tor Mail
Tor2web
TorBook
TorChat
Whonix

Cryptocurrency Definitions

Cryptocurrency
Ricardian Contract
dot-bit
Airbitz
Auroracoin
Base58
Bitcoin
Bitcoin Classic
Bitcoin faucet
Bitcoin network
Bitcoin Suisse AG
Bitcoin XT
BitInstant
BitLicense
Bitwalking
BitX
BlackCoin
Blockchain
BTC-e
Btc-sx
BTCS-company
Buttercoin
Chamber of Digital Commerce
Changelly
Circle-company
Cloud mining
Coinbase
Coincheck
CoinDesk
CoinJoin
Coinscrum
CoinTelegraph
Coinye
Colored coins
Counterparty-technology
CryptoCoinsNews
Cryptocurrency tumbler
CryptoNote
Cryptoshare
The DAO
Darknet market
Dash-cryptocurrency
DECENT Network
Decred
Digital currency
Decentralized autonomous organization
Dogecoin
Double-spending
Emercoin
Ethereum
Faircoop
Ghash-io
Huobi
ItBit
Legality of bitcoin by country
Libertyx
Lisk
Litecoin
Magnr
Mastercoin
MazaCoin
Mining pool
Monero-cryptocurrency
Multisignature
Namecoin
NEM-cryptocurrency
NeuCoin
Nu Network
NuBits
Nxt
OKCoin
Peercoin
PotCoin
Primecoin
Proof-of-stake
Proof-of-work system
Ripple
Ripple-payment-protocol
RootStock
SatoshiPay
Shadow
SixEleven
Smart contract
SolarCoin
Steemit
Stellar Payment Network
Synereo
Syscoin
The Cobden Centre
Titcoin
Vertcoin
Woodcoin
Zcash
Zerocoin