β οΈ Critical Disclaimer
No VPN service is endorsed. VPNs are only as trustworthy as the companies running them. This is educational content only. All VPN providers have potential risks and may be compromised or compelled to cooperate with authorities. Jurisdiction, logging policies, and business models matter significantly. Always research current practices and consider your specific threat model.
VPN Reality Check
VPNs are not magic privacy solutions. They shift trust from your ISP to the VPN provider. Understanding their limitations is crucial:
- Trust shift: You're trusting the VPN provider instead of your ISP
- Logging policies: "No logs" claims may be misleading or legally challenged
- Jurisdiction matters: Where the VPN is based affects legal obligations
- Business model: Free VPNs often monetize through data collection
- Government pressure: VPN providers can be forced to cooperate
π‘ When VPNs Are Useful
VPNs are most effective for: protecting against local network surveillance, bypassing geographic restrictions, hiding internet activity from ISPs, and securing connections on public Wi-Fi. They're less effective against: sophisticated state-level surveillance, browser fingerprinting, and social media tracking.
VPN Evaluation Criteria
Critical Factors
- Jurisdiction: Legal environment and intelligence sharing agreements
- Logging policy: What data is collected and retained
- Business model: How the VPN makes money
- Ownership: Who owns the VPN company
- Auditing: Independent security audits
- Warrant canaries: Indicators of government requests
- Kill switch: Automatic disconnection if VPN fails
- DNS leak protection: Prevents DNS queries from leaking
VPN Provider Assessment
Mullvad
β β β β βJurisdiction: Sweden
Strengths: No personal data required, audited, flat pricing
Weaknesses: EU jurisdiction, limited servers
Payment: Cash accepted, anonymous accounts
IVPN
β β β β βJurisdiction: Gibraltar
Strengths: Audited, minimal data collection, kill switch
Weaknesses: Higher price, smaller network
Payment: Cash and crypto accepted
ProtonVPN
β β β β βJurisdiction: Switzerland
Strengths: Swiss privacy laws, Secure Core, free tier
Weaknesses: Requires account, limited free version
Payment: Various methods accepted
NordVPN
β β βββJurisdiction: Panama
Strengths: Large server network, marketing budget
Weaknesses: Previous breaches, aggressive marketing
Payment: Standard payment methods
ExpressVPN
β β βββJurisdiction: British Virgin Islands
Strengths: Fast speeds, good apps
Weaknesses: Owned by Kape Technologies, expensive
Payment: Standard payment methods
Free VPNs
β ββββBusiness Model: Data collection and advertising
Risks: Malware, data selling, poor security
Examples: Hola, Hotspot Shield, most free options
Recommendation: Avoid completely
Jurisdiction Considerations
Five Eyes (US, UK, AU, CA, NZ)
Extensive intelligence sharing. VPN providers may be compelled to collect data or provide backdoors.
European Union
Strong privacy laws (GDPR) but increasing surveillance cooperation. Data retention requirements may apply.
Privacy Havens
Countries like Switzerland, Iceland, and some offshore jurisdictions have stronger privacy protections.
Authoritarian Regimes
China, Russia, and other authoritarian states may ban VPNs or force cooperation with surveillance.
VPN Configuration Best Practices
Essential Settings
- Kill switch: Always enable to prevent IP leaks
- DNS leak protection: Use VPN's DNS servers
- Auto-connect: Connect automatically on untrusted networks
- Protocol selection: Use OpenVPN or WireGuard
- IPv6 blocking: Disable IPv6 to prevent leaks
- Split tunneling: Avoid unless necessary
Server Selection Strategy
- Nearby servers: Better performance, lower latency
- High-traffic servers: More anonymous in the crowd
- Avoid specific countries: Based on your threat model
- Multiple servers: Rotate regularly
- Dedicated IP: Avoid unless absolutely necessary
Multi-Hop and Advanced Configurations
Multi-Hop VPN
- Concept: Route traffic through multiple VPN servers
- Benefits: Increased anonymity, multiple jurisdiction protection
- Drawbacks: Slower speeds, more complex
- Providers: ProtonVPN Secure Core, IVPN Multi-Hop
VPN + Tor
- VPN then Tor: VPN hides Tor usage from ISP
- Tor then VPN: VPN hides exit node activity
- Tradeoffs: Complex setup, potential timing attacks
- Use cases: High-threat environments
VPN Limitations and Alternatives
What VPNs Don't Protect Against
- Browser fingerprinting: Unique browser characteristics
- Social media tracking: Account-based tracking
- Malware: Infected devices remain compromised
- Sophisticated attacks: State-level adversaries
- Endpoint security: Device-level vulnerabilities
Alternative Privacy Technologies
- Tor Browser: Onion routing for maximum anonymity
- I2P: Invisible Internet Project for hidden services
- Proxy servers: Simpler but less secure
- SSH tunnels: For technical users
Payment and Registration Privacy
Anonymous Payment Methods
- Cash: Mullvad accepts cash payments
- Cryptocurrency: Monero preferred over Bitcoin
- Prepaid cards: Purchased with cash
- Gift cards: Some providers accept them
- Avoid: Credit cards, PayPal, bank transfers
Registration Best Practices
- Fake information: Use non-identifying details
- Temporary email: Use disposable email addresses
- Tor registration: Sign up through Tor
- Separate identity: Don't link to real identity
Testing VPN Security
Leak Testing
- IP leak test: Check if real IP is visible
- DNS leak test: Verify DNS queries go through VPN
- WebRTC leak test: Test for WebRTC IP leaks
- IPv6 leak test: Check for IPv6 bypassing
Testing Tools
- ipleak.net: Comprehensive leak testing
- dnsleaktest.com: DNS leak detection
- doileak.com: Multiple leak tests
- whoer.net: Privacy and anonymity testing
Threat-Specific VPN Strategies
Public Wi-Fi
Always use VPN on public networks. Enable auto-connect for open networks. Verify server authenticity.
Censorship Circumvention
Use obfuscated servers, change protocols, have multiple VPN providers as backup.
Journalism/Activism
Use VPN + Tor, pay anonymously, use providers in privacy-friendly jurisdictions.
Business Use
Consider self-hosted VPNs, multi-hop configurations, dedicated IPs for specific use cases.
Self-Hosted VPN Solutions
Advantages of Self-Hosting
- Complete control: You control logging and data retention
- Custom configuration: Tailored to your specific needs
- Cost effective: Cheaper for long-term use
- No third-party trust: Don't rely on VPN companies
Self-Hosted VPN Options
- WireGuard: Modern, fast, and secure
- OpenVPN: Mature, well-tested, widely supported
- Algo VPN: Automated VPN deployment
- Outline: Jigsaw's VPN solution
Mobile VPN Considerations
Mobile-Specific Settings
- Always-on VPN: Enable in device settings
- Battery optimization: Exclude VPN from battery saving
- Network switching: Auto-connect on untrusted networks
- Split tunneling: Avoid to prevent leaks
Quick Start Guide
Immediate Actions (15 minutes)
- Research VPN providers based on your threat model
- Choose a provider with good privacy practices
- Sign up using anonymous methods if possible
- Install VPN app and enable kill switch
- Test for leaks using testing tools
This Week
- Configure VPN on all devices
- Set up auto-connect for untrusted networks
- Test VPN performance and security
- Configure DNS leak protection
- Consider multi-hop or VPN+Tor setup
Next Steps
VPNs are one tool in a comprehensive privacy strategy:
Learn Tor Basics Secure DNS Back to Guides