Security Market Segment LS
Friday, 02 June 2017 16:39

Mandatory data retention laws drive 100% uptake in VPN software Featured


Australians are getting increasingly concerned about their privacy due to the new data retention laws, with a 100% increase in VPN software use since the law took effect on 13 April.

NordVPN, a Virtual Network Service provider, has seen an increase of 100% in its users from Australia.

Tim Singleton Norton, a privacy advocate with Digital Rights Watch, said digital rights advocates who campaigned heavily against the laws were calling 13 April "get a VPN day. “It is probably one of the best ways to try and get around the idea of your internet provider providing all of the metadata engagement that you do online to your government," he said.

Marty P. Kamden, chief marketing officer of NordVPN, obviously agrees saying, “It is common to turn to VPNs when anti-privacy laws are passed. Collecting metadata undermines Australians’ privacy – and the benefits of data collection are still not clear. Any kind of data retention is known to attract hackers, lured by huge amounts of personal data stored in one place. A VPN protects people’s privacy online through encrypting data and routing it through a secure tunnel.”

Metadata is not what you say in a phone call or type in an email – it is where you did it from, what device you use, when you did it, to whom you sent it and establishes patterns like how often you did it.

A VPN sits in between you and your ISP using the VPN's address, so all it sees is the VPN and nothing else. VPN users need to trade off any speed issues and think about what sorts of browsing and email contents need to be protected. In reality, it is easier to protect everything.

Kamden says it is not just the government that is collecting metadata/ He says there are three major ways of it is being collected.

  1. Mandatory Data Retention – the ISP role

Australian ISPs are now collecting and retaining Internet users’ metadata, which includes people’s names, addresses, phone numbers, and so on. Tracking the location of a phone every time it connects to the Internet is enough to establish where the owner of the phone lives and works. Personal data of millions of Australians is kept in vast, not necessarily well-encrypted databases, posing a major security and privacy threat in case of a data breach. Similar laws have been adopted in multiple countries. However, based on their experience, metadata cannot effectively help in fighting crime.   

  1. Google, Facebook, and other giant tech companies

Data has recently become the most valuable commodity in the world, and it stays in the hands of a few giants, namely Google, Facebook, Amazon, Microsoft, and Apple. Facebook knows who are user’s friends, which interactions they did, which sites they visited, what they bought, and much more. Google collects a user’s name, email address, telephone number and credit card (if entered). It also uses different types of cookies to track one’s interaction with other websites, device used, search queries and so on. UK’s Conservative Party has announced that it plans to rein in the power of private companies – such as Facebook and Google – and to give more power to the government. But is it a better alternative? Doubtfully. The proposal could force Facebook and Google to decide which material should be censored or face heavy fines - thus the main content censors will be Facebook and Google themselves.

  1. Advertisers

Advertisers track Internet users every time they go online. Moreover, advertisers use cross-device tracking, which raises additional privacy and security risks. Through cross-device tracking, ad companies and publishers build a consumer’s profile based on their activity throughout digital devices. Basically, most Internet users are tracked from the moment they wake up till they go to sleep through the variety of devices and physical locations revealed by their GPS co-ordinates.

What can you do?

When faced with surveillance by the government, ISPs, large companies, and advertisers, people still have some power in their own hands to protect their privacy.

Kamden says, “Internet users should regularly delete cookies, use privacy-oriented browser plugins, install anti-virus and anti-tracking software, and make sure not to enter personal passcodes and credit card information when using open Wi-Fi networks. The best-known method to keep your information private and encrypted from ISPs is a VPN.”

 VPN meta data Hackett

Read 6697 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Ray Shaw

joomla stats

Ray Shaw  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News