23 votes

Does a trustworthy VPN provide privacy? If so, how do you know if a VPN is trustworthy?

It's hard to get a straight answer on this because there are allegations of shilling everywhere when it comes to VPNs (particularly when you discuss specific providers). There's also this post which gets linked pretty frequently and which seems to throw a wrench in the whole idea.

For context, I ask because I have two main concerns:

  1. I have been the subject of a mild internet stalking/doxing, and I have no wish to relive that experience.
  2. I live in the United States and, if I am understanding things correctly, my ISP now has the right to sell my browsing data without my consent.

I have no love for my ISP and am all about the idea of blocking them from gathering data about me, but it seems the only other option is to hand all of my data over to another company who simply promises not to do anything with it. While I'm sure some of them are legitimate, how can you tell the difference between a genuine privacy tool and a honeypot?

9 comments

  1. [4]
    precise
    Link
    VPNs simply shift trust, they don't give you immutable privacy. Uses for a VPN vary based on who you are trying to protect yourself against. In my case, I don't like my home ISP seeing my internet...

    VPNs simply shift trust, they don't give you immutable privacy. Uses for a VPN vary based on who you are trying to protect yourself against. In my case, I don't like my home ISP seeing my internet traffic, for this I use a high bandwidth, low latency VPN on my router. In other cases, like public Wi-Fi, I also use a different VPN. There are different use cases for everyone, these are simply mine.

    My guide to choosing a VPN is mostly based around transparency, ethics, technology and location.

    • Transparency: Do they have a comprehensive logging policy, stating what they do and don't log, and how long logs are retained? Do they offer breakdowns of their financial information? Do they provide their actual identity in line with the service?
    • Ethics: Do they have a questionable history? Do they have referral programs? Do they have connections to advertisers? Do they censor or throttle certain traffic?
    • Technology: Do they support various protocols I'd like to use in a more secure environment, e.g. SSL VPN over 443, SSH, etc? Are they ok with Tor traffic, P2P, etc? What types of encryption schemes do they support?
    • Location: Are they located in a 5, 9, or 14 eyes country that is known to cooperate in international surveillance efforts? Where are their servers located? Business?

    With location I tend to compromise, for my home VPN, I use a domestic VPN because I'd like the decreased latency associated with that. For other uses, I try and use a "offshore" or non-14 eyes VPN.

    I've not mentioned any specific VPN providers, because as @kfwyre pointed out, shilling in the VPN business is quite common. These are just some of the factors I use in choosing a VPN.

    Oh, another thing, if the longer the company has been around, the better.

    16 votes
    1. [2]
      nacho
      Link Parent
      I work in networking. My position happens to grant incredible insight into how the internet works because I bridge two departments. There's a lot of things I'm not legally allowed to discuss or...

      I work in networking. My position happens to grant incredible insight into how the internet works because I bridge two departments. There's a lot of things I'm not legally allowed to discuss or disclose (or in some cases am not allowed to say that I can't discuss or disclose).

      I think you nail some really important things. Good advice. Especially regarding services that have a pedigree and clearly identified owners/leadership. And also regarding allowing many different types of encryption/security. If they only allow one or two, stay away.

      I'm not sure whether I agree with where you land on all the different things to consider though, depending on where you land in specific questions.


      • No logs-policies are often not legal in the location a VPN claims to be in. Like with Tildes, clear and reasonable rules that match the jurisdiction of the service is always best. Actual day-to-day data handling is way more important than written publicly-exposed policy.

      • In offshore localities, what privacy guarantees do you have? What is known about surveillance in that jurisdiction? If the answer is very little, stay out. A VPN located in a 5-eyes country with good data protection policies and practices is the devil you know in the jurisdiction you know where you have actual legal recourse.

      • Stay away from any service located in an authoritarian country or country where the legal system isn't internationally recognized for being fair and free (if open court is bad, what happens in closed/secret court?).

      • Be skeptical of all VPNs that cater to, or advertise services that facilitate illegal activity, like illegal p2p filesharing. These are the services governments will clamp down on and extract your information from. Even if you aren't using a VPN to protect personal crimes, your data is more likely to be collected too.

      • How much can you really hide from modern governments? VPNs are primarily useful for avoiding malicious sites or companies get a hold of your details.

      • Does your VPN not block access to content it is legally required to block access to in its jurisdiction ( say if it's Norwegian and it circumvents the Norwegian police childporn-filter)? Stay away. This is a huge flag for scrutiny and information being handed over.

      10 votes
      1. precise
        Link Parent
        I'd be interested in knowing what sort of position you hold, what do you mean you bridge two departments? Don't feel pressure to go into too much detail, I'm just curious. :) I'd like to respond...

        I'd be interested in knowing what sort of position you hold, what do you mean you bridge two departments? Don't feel pressure to go into too much detail, I'm just curious. :) I'd like to respond to some of your points if you don't mind.

        • You make a good point, it's something I've kept an eye on but omitted out of forgetfulness.
        • I'm sorry, but I trust some random person in a foreign country, who's entire business is privacy, over a 5, 9 ,14 eyes based company. It's been made quite well known those countries are practicing wide dragnet digital surveillance. Meanwhile, no claims have been made against these offshore VPNs (at least the ones I use). It's a matter of personal trust, and I have almost no trust in my countries government in that capacity.
        • First off, P2P file sharing is not illegal. I presume you know that, but I didn't feel like I could let that statement stand as is :P. While VPNs targeted at people pirating content may be a more frequent target, I don't recall any instance where such a service was targeted specifically because they permit pirating; please correct me if I am wrong. Furthermore, do you have any source on your statement that your data is more likely to be collected when you use VPNs to protect "personal crimes"?
        • Hiding from a nation state is damn near impossible, but I'll be damned if I don't make them earn my data. Just because the fight for privacy is increasingly difficult, doesn't mean it's not worth fighting. As stated in my original comment, my main purpose is to protect my internet habits from falling into the hands of my ISP for advertising purposes, etc. Also, I do not at all use a VPN for avoiding malicious sites. While I suppose this could be a function, in 99% of cases it is not. Frankly, I'd straight avoid a VPN that offered to "filter" malicious sites. I'm not paying the VPN to be censored, I'm in control.
        • Once again, I am in control. I'm not going to pay for a VPN that filters or censors anything, on any topic. Not to say I'm looking for child porn, but I'm not going to give my money to a service, where the goal is 100% internet freedom, yet they still bow down to some high organization. Also, your use of child porn as an example rubs me the wrong way. That is always the first reason that internet regulations, surveillance and censorship are supposedly needed. Right alongside terrorism, which brought much of the internet surveillance into existence in the first place.
        5 votes
    2. elfox
      Link Parent
      Yeah, the main reason I use one is because I don't like my ISP to see my traffic. My ISP is a very crappy company, but only high speed here and only ISP my house gets. I use IPVanish because it...

      Yeah, the main reason I use one is because I don't like my ISP to see my traffic. My ISP is a very crappy company, but only high speed here and only ISP my house gets.

      I use IPVanish because it has apps and just works. But also because you can log in and download a file that has every single cert for every server and set up openvpn with any of them and your creds. I think it's like $70 a year and this is year 3 for me.

      They also claim to not log.

      2 votes
  2. tildez
    Link
    From everything I’ve read, it’s impossible to know. You are moving your trust from your ISP and putting it into the VPN provider. My thought process is that I know my ISP is screwing me over as...

    From everything I’ve read, it’s impossible to know. You are moving your trust from your ISP and putting it into the VPN provider.

    My thought process is that I know my ISP is screwing me over as hard as possible, hopefully within the laughably weak (in the US) digital data laws. I would expect that a decent VPN provider, who’s business relies on a reputation for privacy, would not be screwing me as hard. At the end of the day it’s mostly blind trust.

    6 votes
  3. spit-evil-olive-tips
    Link
    My personal opinion is that you should never trust a 3rd party VPN service. One of two things is going to happen to every VPN service out there, sooner or later. The first one is that they're...

    My personal opinion is that you should never trust a 3rd party VPN service.

    One of two things is going to happen to every VPN service out there, sooner or later. The first one is that they're going to sell your data, spy on your traffic, etc. The second possibility is that the VPN service gets compromised and those people sell your data or spy on you. The internal servers that run the VPN are huge targets for anyone with malicious intent, because if they can break in to those they can potentially snoop on the traffic of thousands of people.

    If you're technically inclined, it's fairly easy to set up a self-hosted VPN. You pay ~$5/month to a shared hosting provider somewhere (Digital Ocean, Linode, and Vultr are a few of the more well-known ones), then set up a Linux VM running OpenVPN (or Wireguard, if you want to live on the bleeding edge). Install the VPN client locally, if you're using OpenVPN do the ritual goat sacrifice at the full moon involved in generating X.509 certificates, and then you're done.

    It's not perfectly secure, because nothing is, but it is substantially better, at the cost of more time getting it set up.

    6 votes
  4. what
    Link
    It’s tough, and I’m not sure there’s even a way to prove it for sure. I know Private Internet Access has been proven in court to not keep logs several times, but I’m not sure now much that...

    It’s tough, and I’m not sure there’s even a way to prove it for sure.

    I know Private Internet Access has been proven in court to not keep logs several times, but I’m not sure now much that actually means, especially since they’re a US-based company.

    5 votes
  5. Neverland
    (edited )
    Link
    Well, my personal opinion is that a VPN provider is the ideal Kompromat gathering tool for an intel agency. I would bet that in a few decades it turns out that VPN providers were created or bought...

    Well, my personal opinion is that a VPN provider is the ideal Kompromat gathering tool for an intel agency. I would bet that in a few decades it turns out that VPN providers were created or bought by the major intel agencies. Not only could it gather comprising info on you, but also make black money at the same time.

    Due to now erased info, I don’t trust PIA at all. I kind of trust TorGuard, which I personally use. There is no ideal solution here. I suppose it depends on what you are trying to get away with. If it’s just privacy, then using an EU based VPN provider might be best.

    I use TorGuard(DE) for, umm personal things I don’t want corporate entities to know about, and I set up an OpenVPN server on AWS for work, for things I don’t want foreign agents to know about.

    4 votes