The United States government decision to do away with legal privacy provisions that stopped internet providers and telcos to snoop on you while being online isn't quite as bad as it appeared because the subscriber data that can be collected will be anonymised.
Nevertheless, it's a substantial weakening of online privacy. Who wants what they do on the internet to be bundled up and handed to marketers, even if it is anonymised? Nobody.
This and the internet becoming increasingly hostile, with surveillance and automated drive-by hacking, has led to a boom in security solutions.
One category, virtual private networking (VPNs) are touted as the panacea to telco and government snooping; they can indeed be useful and make life on the net more secure, but be careful and learn some more before trusting your deepest (and maybe darkest) secrets to a VPN.
VPNs are often referred to as "tunnels" where your data flows safely, shielded by virtual walls of impregnable encryption so that nobody can see your communications. Nor can they see the internet protocol address of your computer, or the unique, hardware identifier for the network interface.
Tunneling is a bit misleading however: VPNs work by encrypting data between your computer or device, and another system. Even if they can't work out what's being sent, nasty people can usually tell that there is something being transmitted between two or more endpoints. There are governments and organisations who take a great deal of interest in people using VPNs, and you might not want to draw attention to that.