VPNs 🔗
Updated September 7, 2025
A VPN (Virtual Private Network) encrypts your internet connection, keeping your activity private and secure from hackers, internet providers, and surveillance. It also hides your IP address, making it seem like you’re browsing from another location.
Why use a VPN? 🔗
- Adds an extra layer of security when in public spaces, like a café Wifi, or hotel.
- Sometimes there are blockers on the Wifi network you are connected to, and you want to jump over them. Does not always work.
- You need to access a website which has geolocation blocks.
- Prevents tracking by websites and advertisers.
- Hides your IP address and location.
- Bypasses censorship and content restrictions.
- Enhances privacy while browsing or streaming
We need to be careful when choosing a VPN service
A 2023 study analyzing 243 VPN ads on YouTube found that over 80% made misleading or false claims about anonymity, tracking, or security. Many influencers failed to verify the claims they were paid to promote.
— (TechRadar, 2023)
In 2020, seven VPN services that claimed to have strict “no-logs” policies—including UFO VPN and Super VPN—were exposed for leaking a combined 1.2 terabytes of user data. The exposed logs contained sensitive information such as names, IP addresses, session timestamps, device IDs, and even plaintext passwords, all left publicly accessible on an unsecured Elasticsearch server.
VPNMentor’s investigation revealed that all seven services shared the same white-label infrastructure, strongly suggesting a single backend provider powering each front-end brand.
— (WeLiveSecurity, 2020)
VPN trust checklist v. full-scope, third-party audit
When selecting a Virtual Private Network (VPN) service for personal or professional use, prioritizing privacy and security should be your primary concern. A trustworthy VPN provider should demonstrate a genuine commitment to protecting your data and online activities through verifiable practices and transparent operations. The following criteria represent the gold standard for evaluating VPN services that truly safeguard your digital privacy:
- Transparent ownership
- Open-source clients
- Anonymous payment options, including cash
- No connection metadata
- Privacy-first features (kill switch, DNS leak, Tor bridge)
- A paid service is usually much prefferable to a free one, with some exceptions like Proton VPN. As a general rule, if a VPN service is free, you and your information are the price you pay to use it. Choose carefully.
What does it do, not do and when to use one 🔗
What a VPN actually does
- encrypts traffic between device & server
- masks your IP from local networks
- hides IP from websites you visit
- protects you on sketchy public Wi-Fi
- helps bypass censorship and geo-blocks
What a VPN can't do
- doesn’t make you anonymous
- doesn’t block trackers or fingerprinting
- doesn’t stop DNS leaks by default
- doesn’t block apps from phoning home
- doesn’t protect from phishing or malware
When NOT to use a VPN
- you need true anonymity you’re a journalist or activist
- you don’t trust centralized providers
- you’re at risk from subpoenas
- you’re being fingerprinted anyway
When a VPN still helps
- using public Wi-Fi at airports or cafes
- bypassing school, work, or government firewalls
- accessing blocked content like Netflix
- distrusting your ISP
- reducing your IP-based tracking surface
If you actually need privacy… 🔗
These are better privacy tools than VPNs:
- DNS over HTTPS (DoH)
- Tor Browser (used correctly)
- Hardened Firefox
- Browser isolation
- Self-hosted VPN server
Layered privacy strategy 🔗
Protecting your digital privacy requires a multi-layered approach rather than relying on any single tool. Like physical security systems that use multiple barriers, effective digital privacy combines several complementary technologies and practices. Each layer in this strategy addresses different aspects of online tracking—from basic encrypted connections to sophisticated methods that prevent detailed profiling. While no approach guarantees complete anonymity, implementing these five layers together significantly reduces your exposure to data collection and privacy invasions.
HTTPS: Encrypted trafficDoH: Hidden DNS lookupsFirefox + uBlock: Tracker defenseTor: Obfuscation (not invisibility)Isolation: Stops profiling
![]()
Proton VPN 🔗
Proton VPN is a privacy-focused virtual private network developed by the team behind Proton Mail. Based in Switzerland, it benefits from strong privacy laws and enforces a strict no-logs policy.
This is the preffered service at MobilityData for the following reasons:
- open-source transparency;
- independent audits;
- supports the latest standards;
- fast and reliable;
- no ads even on the free plan;
- does not record any transaction or data.
How to install Proton VPN 🔗
The app should already be installed on your computer, inside Applications. Otherwise it is available in the Self-Service app.
How to use Proton VPN 🔗
Free plans do not allow you to choose the country you connect to, selected at random between the Netherlands, the United States and Japan.
- You will need a free account:
- Go to this page and look for the small Get Proton Free button on the right, under the prices.
- In the popup that opens, click Continue with free.
- Follow the steps to create an account with your @mobilitydata.org address.
- You do not need 2FA/MFA for this account, you can add it if you wish.
- Do not forget to store all this information inside your 1Password Employee vault.
- Open the application and login with the account you defined earlier.
- Set the following settings:
- Open the preferences window (
Proton VPN menu>Preferences, or Cmd+, ) - In the
Generaltab, check Notify unprotected networks.- This way if you are disconnected or connected to an unsecure network, you will be notified.
- In the
Connectiontab, for the protocol you can choose Wireguard, but Smart is good enough. - In the
Advancedtab, check Allow alternative routing.
- Open the preferences window (
- Optionally in the main window, you can enable the
Kill switchwhich will cut the internet connection entirely if you are disconnected from the VPN.- That way you do not use the internet without being aware you are not safe.
- Whenever you are ready to use, click on Quick connect.
- Whenever you are done using it, click Disconnect.
VPN services that are safe to use 🔗
- Proton VPN
- Based in Switzerland
- Independently audited strict no-logs policy
- Privacy-focused
- Free tier that can be trusted but limited to only three countries selected at random.
- NordVPN
- Based in Panama
- Independently audited no-logs policy
- More mainstream but still strong on privacy
- Mullvad
- Based in Sweden
- No account needed (uses anonymous account numbers)
- No-logs, strong reputation in privacy community
- IVPN
- Based in Gibraltar
- No-logs, supports anonymous payment (cash, Monero)
- Transparent, open-source apps
- AirVPN
- Based in Italy
- Operated by activists/hacktivists
- No-logs, strong technical configuration options
- Perfect Privacy
- Based in Switzerland
- No-logs, advanced features like multi-hop and TrackStop
VPN services to stay away from 🔗
The following VPN companies and services have been found to store user data and use that for other means. Please stay away from them.
The VPN Scam Industry
The VPN market has unfortunately attracted numerous bad actors who exploit users’ privacy concerns for profit. Many questionable VPN services employ aggressive marketing tactics, making exaggerated claims about military-grade encryption or 100% anonymity while actually logging user data, injecting ads, or even selling browsing information to third parties. These services often target users with unrealistic promises of completely free premium services or lifetime subscriptions at impossibly low prices.
This industry is valued at roughly $48-73 billion USD annually as of 2024, therefore there is a lot of incentives to sell you one.
Red flags include VPN providers with:
- unclear ownership structures;
- no transparent privacy policies;
- servers located exclusively in privacy-unfriendly jurisdictions;
- … or those that require excessive permissions on your devices.
Some malicious VPNs have been caught installing malware, while others are simply data collection fronts disguised as privacy tools. The proliferation of fake review sites and astroturfed recommendations further complicates the landscape, making it difficult for users to identify legitimate services.
This is why sticking to established criteria for trustworthy VPN services is essential. When your digital privacy and potentially sensitive work data are at stake, thorough research and skepticism of too-good-to-be-true offers can save you from compromising the very privacy you’re trying to protect.
- Any service offered by Kape technologies
- Autumn Breeze Pte. Ltd.
- Best VPN Proxy AppVPN
- CyberGhost
- ExpressVPN
- HulaVPN - Best Fast Secure VPN / HulaVPN - Fast Secure VPN
- Now VPN - Best VPN Proxy
- Onavo
- Ostrich VPN - Proxy Master / Ostrich VPN - Proxy Unlimited
- Pearl VPN
- Private Internet Access
- Qihoo 360
- Signal Secure VPN / Signal Secure VPN - Robot VPN
- Snap VPN / Snap VPN: Super Fast VPN Proxy
- Speedy Quark VPN - VPN Proxy / Speedy Quark VPN - VPN Master
- ThunderVPN
- Turbo VPN Private Browser / Turbo VPN - Secure VPN Proxy
- VPN Proxy AppVPN
- VPN Proxy Master - Super VPN
- VPN Proxy OvpnSpider
- VPNIFY - Unlimited VPN
- WireVPN - Fast VPN & Proxy
- Wirevpn - Secure & Fast VPN
- X-VPN - Super VPN & Best Proxy / X-VPN - Private Browser VPN
- ZenMate