Extraordinary claims require extraordinary evidence.
When is it no longer horrible?
Automatic traffic shaping for when you change networks frequently (like with a laptop).
Well over 60% of all hacks and breaches are the result of weak, stolen, default (or reused) passwords. Do you really want to be part of that statistic?