‣ From sites and corporations tracking you for advertising, marketing, geo-blocking, ... and sometimes leaking the data or ignoring regulations.
‣ From attackers collecting leaked data or harvesting IP addresses on P2P networks to stalk or extort you.
‣ Defend against eavesdropping & tampering, from compromised WiFi access points to intrusive corporate monitoring and Deep Packet Inspection.
‣ Avoid network limitations (IPv6 unavailable, bad peering, misconfigured firewalls, ...) and circumvent interception attempts (lying DNS, DNS blocking, ...)