Who Owns, Operates, and Develops Your VPN Matters
Perceived value and common use cases
- Many see commercial VPNs as a marketing-driven “money-making scheme” built on vague promises of “security” and “identity theft protection.”
- Actual user reasons skew concrete: piracy/torrents, porn, bypassing geo-blocks for streaming or crypto, avoiding ISP complaints, evading campus/office/public Wi‑Fi blocks, and slightly safer political shitposting.
- A minority use VPNs for routing/peering improvements, roaming between ISPs without dropping connections, and hiding home IP when posting or running services.
Trust, ownership, and logging
- Strong skepticism that price or slick branding correlates with trustworthiness; some suspect intelligence or criminal ownership, especially of very heavily advertised services or those linked to Israeli firms.
- Doubts that “no log” claims would survive serious government pressure or national-security demands; audits can’t see what happens in secret rooms or after a court order.
- Some still prefer VPNs over ISPs, especially in countries with mandatory logging or censorship; others prefer ISPs they can sue under local law.
Threat models and limitations
- Repeated refrain: “threat model matters.”
- VPNs are seen as adequate for low-level legal risk (copyright, minor speech issues), not for high-stakes crimes or evading powerful state actors.
- Correlation/traffic analysis (timing, size, path) and browser/device fingerprinting can often deanonymize users regardless of IP or VPN.
DIY VPNs and alternatives
- Self-hosted VPNs on VPS/home servers are common for ad-blocking DNS, safer use of public Wi‑Fi, and avoiding ISP snooping, but don’t provide strong anonymity and often get blocked by major sites.
- Mentioned alternatives: Tor, Tailscale/WireGuard meshes, onion payment to VPNs, and zero-/multi‑party relay schemes (MASQUE, iCloud Private Relay, multi-party relay services).
Censorship, speech, and politics
- VPNs are viewed as vital in more repressive regimes or where porn/social media age-verification regimes effectively censor content.
- Debate over “self‑censorship” vs. using VPNs to speak more freely about controversial politics.
Technical nuances
- HTTPS, HSTS, SNI, DNS hijacking, browser fingerprinting, and MASQUE/iCloud Private Relay are all discussed as shaping what VPNs can and cannot protect.
- Some enthusiasm for traffic obfuscation (padding/chaff, DAITA-like systems) but recognition that correlation attacks remain hard to defeat.
Findings referenced from the report
- “More transparent, no concerning findings”: Mullvad, TunnelBear, Lantern, Psiphon, ProtonVPN.
- “Anonymous operators, potentially concerning”: several mid-tier/mobile-focused services (e.g., Astrill, PureVPN, Potato VPN and others).
- “Concerning/suspicious, avoid”: a cluster of mostly mobile/free VPN brands tied to opaque entities (Innovative Connecting, Autumn Breeze, Lemon Clove, various “Melon/Snap/Turbo/Super” VPNs, etc.).
- Some commenters question why major market leaders like NordVPN/ExpressVPN weren’t analyzed.