Deutsch | English

Frequently asked questions about digital freedom and privacy

Answers to common questions – no product marketing, no security promises.

Encryption where only sender and recipient can read the content. Servers and providers in between see only unreadable data. Metadata may still be generated.

Data about the communication: who, when, with whom, from which device. It is often not encrypted and can be very revealing.

A VPN routes your traffic through a tunnel to the VPN provider. That protects you from eavesdropping on the local network (e.g. Wi‑Fi). The VPN provider still sees the traffic. For basic privacy in a café it is often enough; for high-stakes scenarios not on its own.

Open source allows review; it does not guarantee that anyone has reviewed the code or that there are no hidden dependencies. It is one factor, not a guarantee of security.

No single party controls the system. Data or services are spread across many nodes. That can mean resilience and less dependency, but often more complexity and its own risks.

Tor greatly reduces the link between your traffic and your identity, but does not remove it in all cases. Configuration errors, user behaviour and attacks on the network can enable de-anonymisation.

Clarifying whom or what you want to protect against, and with what effort. Without a threat model it is unclear which measures are useful and which are unnecessary.

No. Anon Vision is an information project only. For concrete measures or in high-risk situations you should consult experts.