The Australian government proposed new legislation that would allow authorities
to undermine end-to-end encryption and grant them “alternative-collection
powers.”
Security researchers have discovered a vulnerability in the WPA2 protocol which
allows for virtually any WiFi network to be hacked, exposing sensitive data.
In this article, we analyze the VPN threat model. This covers the threats a VPN
is designed to guard against, and also the threats a VPN cannot counter.