Apple’s T2 chip on the new Macs perform a wide array of tasks to secure the machine from various hardware- and software-based attacks. The fact that the T2 chip can do so much is also potentially its weakness, as it opens up the machine’s attack surface.
Personal VPNs have a lot of expectations, and they aren't suited for all of them. But there are some scenarios that are ideal for personal VPNs.
The main point of using a personal VPN is to surf the interwebs in privacy, away from prying eyes. Lock down the browser before starting up the personal VPN for maximum benefits.
People expect the personal VPN to hide or otherwise obscure what they are doing on the Internet. Some are better than others, but it is difficult to evaluate them on technical merits. Duo Labs provides guidelines on how to pick a personal VPN that matches your threat model.
Duo Labs researchers discovered that Apple was using serial numbers to authenticate devices with its Device Enrollment Program (DEP). If organizations treat DEP as a trust broker and assume DEP-registered devices are trusted, they expose themselves to a variety of risks, including rogue devices receiving internal network configuration settings.