Security Market Segment LS
Friday, 02 June 2017 16:39

Mandatory data retention laws drive 100% uptake in VPN software Featured


Australians are getting increasingly concerned about their privacy due to the new data retention laws, with a 100% increase in VPN software use since the law took effect on 13 April.

NordVPN, a Virtual Network Service provider, has seen an increase of 100% in its users from Australia.

Tim Singleton Norton, a privacy advocate with Digital Rights Watch, said digital rights advocates who campaigned heavily against the laws were calling 13 April "get a VPN day. “It is probably one of the best ways to try and get around the idea of your internet provider providing all of the metadata engagement that you do online to your government," he said.

Marty P. Kamden, chief marketing officer of NordVPN, obviously agrees saying, “It is common to turn to VPNs when anti-privacy laws are passed. Collecting metadata undermines Australians’ privacy – and the benefits of data collection are still not clear. Any kind of data retention is known to attract hackers, lured by huge amounts of personal data stored in one place. A VPN protects people’s privacy online through encrypting data and routing it through a secure tunnel.”

Metadata is not what you say in a phone call or type in an email – it is where you did it from, what device you use, when you did it, to whom you sent it and establishes patterns like how often you did it.

A VPN sits in between you and your ISP using the VPN's address, so all it sees is the VPN and nothing else. VPN users need to trade off any speed issues and think about what sorts of browsing and email contents need to be protected. In reality, it is easier to protect everything.

Kamden says it is not just the government that is collecting metadata/ He says there are three major ways of it is being collected.

  1. Mandatory Data Retention – the ISP role

Australian ISPs are now collecting and retaining Internet users’ metadata, which includes people’s names, addresses, phone numbers, and so on. Tracking the location of a phone every time it connects to the Internet is enough to establish where the owner of the phone lives and works. Personal data of millions of Australians is kept in vast, not necessarily well-encrypted databases, posing a major security and privacy threat in case of a data breach. Similar laws have been adopted in multiple countries. However, based on their experience, metadata cannot effectively help in fighting crime.   

  1. Google, Facebook, and other giant tech companies

Data has recently become the most valuable commodity in the world, and it stays in the hands of a few giants, namely Google, Facebook, Amazon, Microsoft, and Apple. Facebook knows who are user’s friends, which interactions they did, which sites they visited, what they bought, and much more. Google collects a user’s name, email address, telephone number and credit card (if entered). It also uses different types of cookies to track one’s interaction with other websites, device used, search queries and so on. UK’s Conservative Party has announced that it plans to rein in the power of private companies – such as Facebook and Google – and to give more power to the government. But is it a better alternative? Doubtfully. The proposal could force Facebook and Google to decide which material should be censored or face heavy fines - thus the main content censors will be Facebook and Google themselves.

  1. Advertisers

Advertisers track Internet users every time they go online. Moreover, advertisers use cross-device tracking, which raises additional privacy and security risks. Through cross-device tracking, ad companies and publishers build a consumer’s profile based on their activity throughout digital devices. Basically, most Internet users are tracked from the moment they wake up till they go to sleep through the variety of devices and physical locations revealed by their GPS co-ordinates.

What can you do?

When faced with surveillance by the government, ISPs, large companies, and advertisers, people still have some power in their own hands to protect their privacy.

Kamden says, “Internet users should regularly delete cookies, use privacy-oriented browser plugins, install anti-virus and anti-tracking software, and make sure not to enter personal passcodes and credit card information when using open Wi-Fi networks. The best-known method to keep your information private and encrypted from ISPs is a VPN.”

 VPN meta data Hackett


You cannot afford to miss this Dell Webinar.

With Windows 7 support ending 14th January 2020, its time to start looking at your options.

This can have significant impacts on your organisation but also presents organisations with an opportunity to fundamentally rethink the way users work.

The Details

When: Thursday, September 26, 2019
Presenter: Dell Technologies
Location: Your Computer


QLD, VIC, NSW, ACT & TAS: 11:00 am
SA, NT: 10:30 am
WA: 9:00 am NZ: 1:00 pm

Register and find out all the details you need to know below.



iTWire can help you promote your company, services, and products.


Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]


Ray Shaw

joomla stats

Ray Shaw [email protected]  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!



Recent Comments