Encrypted is definitely the important part.
From how i understand the hide from local traffic though, it some how actually makes you invisible on the LAN. I can’t imagine while blocking all traffic not VPN something being accepted by malicious injection, I have spent bit too much time reading up since my security breach.
Its rather shocking TBH the lack of security on things like your home wifi that we use and trust every day.
One thing it could effect possibly would be if someone gained access and you were using bound MAC addresses etc. But, then I don’t think they would actually be workable while in such an invisible state.
A recent consideration to me has been “yeah it just some innocent irrelevant piece of information but,.when combined with something else what does it give/do?”
One of androids worst security flaws is based just on two permissions and its been shown to not even need to gain those permissions from the same app. Suddenly you are at a complete loss of control. A location history is pretty huge, but when applied to also have a device name, IP, MAC etc… you could be imitated at a usual spot to a pretty huge risk.
We always just run on the law of large numbers, it probably won’t happen to most so I’m unlikely. I Sadly don’t have that luck. If you said during the 5 minute nap I just had someone robbed fort knox with my t-shirt on, having used my credit card to buy the flight there I’d probably not even blink. Yeah sounds about right…
Often we leave WPS on, a system rather easily breeched, and the ability to stream content and such without isolation.
Reviewing the invisible it seems more like it is just aps isolation set at VPN level(?) I wouldn’t mind d having it just on principle. Currently I have my router set to block l such traffic as a just in case (was bit shocked at not only the variety of things that can actually be injected i to various devices but, again the rather easy methods to get some of it happen.
An on device toggle would still be convenient