How do I change my Privacy features?

Mozilla VPN Mozilla VPN Last updated: 57% of users voted this helpful
Hakuna mtu amewasaidia kutafsiri makala hii bado. Kama tayari wajua jinsi ya ujabinishaji wa SUMO hufanya kazi, waweza kuanza kutafsiri sasa. Kama unataka kujifunza jinsi ya kutafsiri makala kwa Sumo, tafadhali anzia hapa.

Mozilla VPN's Privacy features allow you to add extra layers of defense to your connection using DNS-level safeguards that specifically target ads, trackers, and malware.

In this article, you will learn how to activate and deactivate this feature and how it can interact with your custom DNS settings.

Activate and deactivate Privacy features

  1. Open the VPN, and at the bottom right, click (or tap) the Settings icon.
    settings without the speedtest
  2. Select Privacy features.
  3. To activate the features you want, slide the toggles next to them to the right side. You can choose one or more options. To deactivate a feature, just slide the toggle to your left.
    Privacy toggle
    Note: If you experience issues accessing certain websites, try temporarily turning off Privacy features, as they can occasionally cause websites to malfunction or display content inaccurately.
  4. Select Next to save the changes.
    Privacy next

Well done! You have successfully added an extra layer of security to help protect your online activities.

Common questions

What's a tracker?

Online trackers are small pieces of code inserted into the websites you visit, such as cookies or tracking pixels, which allow third parties to collect information about your online activities. When you visit a website that uses trackers, the third party that controls the tracker may be able to infer personal data like your interests, browsing habits and location.

What's malware?

Malware, which is short for malicious software, is a type of software that intentionally harms or disrupts devices and networks or steals or encrypts data. Some examples of malware are viruses, trojans, spyware, and ransomware. Malware can infiltrate your device via several means, such as downloading files from untrustworthy sources, opening email attachments, clicking on malicious links or pop-ups, or connecting to infected devices.

Related content

Learn more

Makala hii ilikuwa na umuhimu?

Tafadhali subiri...

These fine people helped write this article:

Illustration of hands

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

Learn More