How do I change my Privacy features?

Mozilla VPN Mozilla VPN Last updated: 04/02/2024 50% of users voted this helpful
No one has helped translate this article yet. If you already know how localizing for SUMO works, start translating now. If you want to learn how to translate articles for SUMO, please start here.

Mozilla VPN's Privacy features allow you to add extra layers of defense to your connection using DNS-level safeguards that specifically target ads, trackers, and malware.

In this article, you will learn how to activate and deactivate this feature and how it can interact with your custom DNS settings.

Activate and deactivate Privacy features

  1. Open the VPN, and at the bottom right, click (or tap) the Settings icon.
    settings without the speedtest
  2. Select Privacy features.
  3. To activate the features you want, slide the toggles next to them to the right side. You can choose one or more options. To deactivate a feature, just slide the toggle to your left.
    Privacy toggle
    Note: If you experience issues accessing certain websites, try temporarily turning off Privacy features, as they can occasionally cause websites to malfunction or display content inaccurately.
  4. Select Next to save the changes.
    Privacy next

Well done! You have successfully added an extra layer of security to help protect your online activities.

Common questions

What's a tracker?

Online trackers are small pieces of code inserted into the websites you visit, such as cookies or tracking pixels, which allow third parties to collect information about your online activities. When you visit a website that uses trackers, the third party that controls the tracker may be able to infer personal data like your interests, browsing habits and location.

What's malware?

Malware, which is short for malicious software, is a type of software that intentionally harms or disrupts devices and networks or steals or encrypts data. Some examples of malware are viruses, trojans, spyware, and ransomware. Malware can infiltrate your device via several means, such as downloading files from untrustworthy sources, opening email attachments, clicking on malicious links or pop-ups, or connecting to infected devices.

Related content

Learn more

क्या यह लेख उपकारी था?

Please wait...

These fine people helped write this article:

Illustration of hands

श्रमदान करें

Grow and share your expertise with others. Answer questions and improve our knowledge base.

Learn More