How do I change my Privacy features?

Mozilla VPN Mozilla VPN Emelitere ikpeazụ: 1 day, 14 hours ago
Ọnwebeghị onye nyere aka tụgharịa asụsụ edemede a. Ọ bụrụ na ị marala otu ịtụgharị asụsụ maka SUMO si arụ ọrụ, bido ịtụgharị asụsụ ugbu a. Ọ bụrụ na ị chọrọ ịmụta otu esi atụgharị edemede maka SUMO, biko bido ebe a.

Mozilla VPN's Privacy features allow you to add extra layers of defense to your connection using DNS-level safeguards that specifically target ads, trackers, and malware.

In this article, you will learn how to activate and deactivate this feature and how it can interact with your custom DNS settings.

Activate and deactivate Privacy features

  1. Open the VPN, and at the bottom right, click the Settingsvpn settings icon icon.
  2. Select Privacy features.
    Privacy settings vpn
  3. To activate the features you want, slide the toggles next to them to the right side. You can choose one or more options. To deactivate a feature, just slide the toggle to your left.
    privacy features example
    Note: If you experience issues accessing certain websites, try temporarily turning off Privacy features, as they can occasionally cause websites to malfunction or display content inaccurately.

Well done! You have successfully added an extra layer of security to help protect your online activities.

Common questions

What's a tracker?

Online trackers are small pieces of code inserted into the websites you visit, such as cookies or tracking pixels, which allow third parties to collect information about your online activities. When you visit a website that uses trackers, the third party that controls the tracker may be able to infer personal data like your interests, browsing habits and location.

What's malware?

Malware, which is short for malicious software, is a type of software that intentionally harms or disrupts devices and networks or steals or encrypts data. Some examples of malware are viruses, trojans, spyware, and ransomware. Malware can infiltrate your device via several means, such as downloading files from untrustworthy sources, opening email attachments, clicking on malicious links or pop-ups, or connecting to infected devices.

Related content

Learn more

Edemede a abara uru?

Biko chere...

These fine people helped write this article:

Illustration of hands

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

Learn More