What is Internet privacy & why you should care

Our privacy online is under threat, but there is a lot we can do to protect ourselves

IMG_2055.jpg
Casey Ford, PhDCommunications Lead
Ania-Piotrowska.jpg
Ania M. Piotrowska, PhDTechnical reviewer
12 mins read
Pablo: Improve quality
Share

More and more of our daily lives are happening online and increasingly facilitated by single devices like smartphones. What we might not easily see, however, are the ways that our personal and collective privacy is being compromised right under our noses.

It’s natural to expect that what we do online should be private: when we browse the web, send an email to a loved one, or make purchases, why should any of these things be different than going to a library, mailing a letter, or buying something in a store?

This article explains the evolving idea of internet privacy, why it is important, and what the main threats to privacy online are.

What is internet privacy?

Internet privacy refers to the right to control personal data, online activities, and communications. It involves protecting information from tracking, surveillance, and unauthorized access by corporations, governments, ISPs, and cybercriminals through encryption, anonymity tools, and secure browsing practices.

Common questions about internet privacy

  • What kinds of information and activities should be considered “private” when passing through or occurring on the “public” web?
  • How much responsibility does a web company, with whom we share personal information, have to protect this data that they store?
  • What kinds of information can web services share with third parties, and what should they be prohibited from sharing?

Internet privacy: Jurisdictional efforts

Internet privacy has legal and jurisdictional definitions. While many constitutions protect personal privacy, online privacy lacked oversight at the web’s creation and remains a developing issue.

Governments are now recognizing internet privacy as a fundamental right. In the last decade, internet privacy has gradually risen to the level of public and legal attention, demanding governments recognize and work to protect it as a fundamental right of their citizens. Recent legislation like the General Data Protection Regulation (GDPR) in the European Union, which is the most robust governmental privacy protection law to date, is certainly an important step forward.

However, GDPR is regional, while the internet is global. Some governments actively surveil citizens, enforce censorship, and blacklist privacy tools like Virtual Private Networks (VPNs), restricting access to information and digital freedoms.

What is a VPN?

Types of online data

There are two general legal classifications of data regarding your online privacy. As we will see below, the difference between them is crucial but also insufficient.

For example, if you post something to an online message board under a pseudonym, the content of your post is technically non-PII. And if a statistical analysis publishes user traffic data connecting to a particular website after removing IP addresses from the data set, the result is non-PII. But if you disclose your real name in a message, then this information can be linked to your IP address and become PII.

The problem of metadata leakage

The content of our communications (and thus a lot of our PD) is mostly protected these days, with end-to-end encryption becoming the norm. However, in the age of AI, encrypting your online traffic is not enough. This is because of the sophisticated systems harvesting, analyzing, and selling our metadata all across the web, usually without our knowledge and with dubious consent practices (or none at all).

Metadata technically means “data about data,” or the information about the message in the case of communications. It includes information like:

  • IP addresses (what device is connected to what online service), -Timestamps (when a message was sent or a connection made)
  • Duration (how long a connection lasted)
  • Frequency (how often a connection or contact was made over time).

So even if someone can’t read your actual message, there is a lot of information about what you’re doing online that is leaking from your traffic.

Unlike encrypted data, metadata has no legal protections. And while it is not exactly PD, large enough amounts of it in the hands of artificial intelligence (AI) systems can analyze it to deduce a lot of personal information about us. And this information can be the basis of crybersecurity threats, hacking, and censorship.

What is metadata?

Privacy isn't a setting

It's a practice. Start with the right tools.

Earlybird-email banner (1).webp

The future of online privacy

There is perhaps a common misconception that people need extra privacy online because they are breaking the law or have something to hide. But this is a false assumption. Due to the systematic ways that everyone’s data globally is being harvested, surveilled, and exploited, it is necessary to adopt self-defensive privacy measures.

This will continue to be an ongoing struggle as both online tracking and privacy technology co-evolve. Thankfully, as we’ve seen, there are many concrete things we can all do to protect ourselves online.

NymVPN is here to provide you with one crucial tool in this struggle: a VPN built on a novel mixnet to maximally anonymize all of your online traffic.

Whether you’re using Nym’s 2-hop Fast mode or its unparalleled 5-hop Anonymous mode for highly sensitive traffic, users can avoid the security risks posed by centralized VPN services. The choice also allows users to custom configure what traffic needs robust protection and what less sensitive activities (like gaming) need increased speed.

Internet privacy: FAQs

Privacy is multi-layered—VPNs encrypt and route traffic, while browser protection (e.g. anti‑fingerprinting tools, script blockers) guards against cross-site tracking and device fingerprinting.

Emerging DID frameworks let users authenticate or transact pseudonymously without revealing identity, shifting control from centralized authorities to user‑controlled protocols.

Yes—repeated session timings, site visit sequences, and packet sizes can reveal identity unless traffic-obfuscation tools (like mixnets or cover traffic) are used.

VPNs protect traffic across all these, but mobile carriers may still see metadata such as connection behavior. Mixnets or rotating exit nodes help reduce persistent metadata profiling.

Projects with open-source clients, third-party audits, and verifiable reputational systems give users verifiable trust—not just policy promises.

About the authors

IMG_2055.jpg

Casey Ford, PhD

Communications Lead
Casey is the Head of Communications, lead writer, and editorial reviewer at Nym. He holds a PhD in Philosophy and researches the intersection of decentralized technologies and social life.
Ania-Piotrowska.jpg

Ania M. Piotrowska, PhD

Technical reviewer
Ania is Nym's Chief Scientific Officer. She focuses on security, distributed systems, and anonymous communication, including onion routing and mix networks.

New low prices

The world's most private VPN

Try NymVPN for free

Keep Reading...

Pablo: Improve quality

Who is tracking your internet activity, and why?

Your every move online is being tracked. Decentralized VPNs can better protect our privacy.

11 mins read
nym network.webp

Nym is more than a VPN

The first app that protects you from AI surveillance thanks to a noise-generating mixnet

8 mins read
Pablo: Improve quality

Do VPNs protect you from hackers? Experts answer

VPNs can be powerful tools in protecting us from hackers, but not all cyber attacks. dVPNs are even more effective.

12 mins read
Pablo: Improve quality

Encryption & data protection (all you need to know)

Explore how different types of VPNs use encryption to protect your data and privacy

17 mins read