Well, this is a transcendent level of evil: Facebook bought a VPN company and deployed it, in part, to spy on its competitor's users.

https://techcrunch.com/2024/03/26/facebook-secret-project-snooped-snapchat-user-traffic/

It's a reminder that VPNs have their own risks, beyond technical ones if operated incompetently -- namely, that you have to trust the VPN company itself.

UPDATED to reflect which users were being spied on.

Facebook snooped on users' Snapchat traffic in secret project, documents reveal | TechCrunch

A secret program called "Project Ghostbusters" saw Facebook devise a way to intercept and decrypt the encrypted network traffic of Snapchat users to study their behavior.

TechCrunch
@dangillmor it seems liks the article is inaccurate, the traffic between the app and Snapchat is servers is still encrypted with TLS, whether it goes over (additional) encrypted VPN tunnel or not, unless I'm missing some detail somewhere

@charlag @dangillmor

It's not an additional tunnel it's a different network stack that gives the opportunity to encrypt the traffic and siphon off what's wanted before that happens.

I don't know why it's a class action, if there's evidence there's sufficient criminal law to go after the corporate officers.

@simon_lucy @dangillmor okay I still don't get how VPN provider or app would read TLS encrypted traffic

@charlag @dangillmor

"In order to SSL bump Snapchat—and later YouTube and Amazon—Facebook employees created custom client- and server-side code based on Onavo’s VPN proxy app and server stack. This code, which included a client-side “kit” that installed a “root” certificate on Snapchat users’ (and later, YouTube and Amazon users’) mobile devices." They replicated all of the certificates.

https://storage.courtlistener.com/recap/gov.uscourts.cand.369872/gov.uscourts.cand.369872.735.0.pdf

@charlag @dangillmor

In other words, they created a client app which intercepted both ends of the connection.

@simon_lucy @charlag @dangillmor
In other words, it's not a normal VPN, it's (also?) an SSL-proxy that breaks up the encrypted connection