How do I change my Privacy features?

Mozilla VPN Mozilla VPN Esalemi mise à jour yasuka: 60% of users voted this helpful
Mutu moko te naino asalisi mpo na kolimbola article oyo. Soki osili koyeba ndenge kolimbola mpo na SUMO esalaka, banda kolimbola sik'oyo. Soki olingi koyekola ndenge ya kolimbola baarticle mpo na SUMO, banda awa.

Mozilla VPN's Privacy features allow you to add extra layers of defense to your connection using DNS-level safeguards that specifically target ads, trackers, and malware.

In this article, you will learn how to activate and deactivate this feature and how it can interact with your custom DNS settings.

Activate and deactivate Privacy features

  1. Open the VPN, and at the bottom right, click (or tap) the Settings icon.
    settings without the speedtest
  2. Select Privacy features.
  3. To activate the features you want, slide the toggles next to them to the right side. You can choose one or more options. To deactivate a feature, just slide the toggle to your left.
    Privacy toggle
    Note: If you experience issues accessing certain websites, try temporarily turning off Privacy features, as they can occasionally cause websites to malfunction or display content inaccurately.
  4. Select Next to save the changes.
    Privacy next

Well done! You have successfully added an extra layer of security to help protect your online activities.

Common questions

What's a tracker?

Online trackers are small pieces of code inserted into the websites you visit, such as cookies or tracking pixels, which allow third parties to collect information about your online activities. When you visit a website that uses trackers, the third party that controls the tracker may be able to infer personal data like your interests, browsing habits and location.

What's malware?

Malware, which is short for malicious software, is a type of software that intentionally harms or disrupts devices and networks or steals or encrypts data. Some examples of malware are viruses, trojans, spyware, and ransomware. Malware can infiltrate your device via several means, such as downloading files from untrustworthy sources, opening email attachments, clicking on malicious links or pop-ups, or connecting to infected devices.

Related content

Learn more

Article oyo ezalaki ya ntina?

Zela...

These fine people helped write this article:

Illustration of hands

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

Learn More