8 Bad VPNs You Must Avoid to Protect Your Privacy (2024)

We highly recommend that everyone uses a VPN—there's no doubt about that. Indeed, there are many reasons to always use a VPN online, including but not limited to improved personal privacy.

But not all VPNs are worth using. In fact, some VPNs are so bad that you'd actually be better off not using anything other than routing your traffic through their servers. Here are some warning signs to look out for, plus specific VPN services to avoid if you value privacy.

What Makes a VPN Bad for Privacy?

Not all VPNs are created equal. Here are a few reasons some VPNs are bad.

Country of Origin

8 Bad VPNs You Must Avoid to Protect Your Privacy (1)

Never connect to a VPN server that's located in one of the "Five Eyes" countries. Those are the US, UK, Australia, New Zealand, and Canada. Also, avoid the "Nine Eyes" countries (France, Norway, Denmark, The Netherlands). And avoid the "Fourteen Eyes" countries (Belgium, Italy, Germany, Spain, Sweden).

The governments of these countries either spy on their citizens, spy on each other's citizens, swap such intelligence with each other, or otherwise enable and encourage surveillance in some way. These countries are likely to pressure and acquire intelligence from VPN servers operating in their territories.

Activity Logging

When connected to a VPN, all of your internet traffic is routed through the VPN's server. Some keep minimal logs. This might be the IP from which you connected and the time of your connection. Others keep complete track of browsing habits: websites visited, apps used, etc. Logs are bad because they allow activity to be traced back to you eventually.

Even VPN services that promise "no logging" can't be trusted at face value. They might not participate in "activity logging" but may actually be logging other things. How do you know whether a VPN's no-logging claim is trustworthy? You have to read their terms of service.

Terms of Service

A VPN service's Terms of Service outlines exactly what you can expect as a user: what kind of activity is forbidden, what's tracked, what's not, and more. When in doubt, you should contact the service and ask questions to determine what their logging policy is really like.

Some things to keep in mind:

  • Should they log anything related to your connection, including IP or connection time, then it can eventually be traced back to you.
  • If they won't block accounts, even ones that are highly abusive of the system, then there's a good chance the service truly is log-free.
  • If they claim they can block accounts without logging information that can identify you as a user, then you should pry into how it works. Most of the time, they won't be able to give you a clear answer, in which case you should assume logs are somehow involved.

Lack of OpenVPN

8 Bad VPNs You Must Avoid to Protect Your Privacy (2)

VPNs can operate using many different "types" of connections. L2TP and PPTP are some of the more popular. But they have glaring flaws that make them poor options for privacy. OpenVPN is the best protocol because it's open-source and offers the strongest encryption of traffic.

Leak Test Failure

Sometimes, your actual connection to the VPN server can be compromised. For example, your PC goes to sleep and doesn't reestablish the VPN connection upon waking, or you switch from Wi-Fi to Ethernet, or your router gets unplugged, and you have to plug it back in.

Even when you're "successfully" connected to the VPN, some of your traffic may not be routed through that connection. This is called a leak, and it undermines the entire point of using a VPN for privacy.

Specific VPN clients are better than others in this regard. So you should periodically check up on this using so-called leak tests: WebRTC Leak Test, IPLeak, and DNS Leak Test, to name a few. Visit each test twice: once without VPN, once with VPN. Your IP addresses should be different both times.

Free Service

8 Bad VPNs You Must Avoid to Protect Your Privacy (3)

One of the most common VPN myths is that free VPN services are good enough. It turns out that free VPNs come with a lot of risks.

The main one is that such services need to pay for servers and bandwidth somehow. If users aren't paying anything, then they need to generate revenue some other way. Most often, this is by selling user data and information. So if you've been asking yourself, "Is Solo VPN safe?," you have your answer.

Free trials for paid services are fine. But unlimited free services are not. So, as with most things, you get what you pay for, and privacy is not cheap. As such, we always recommend paid VPNs over free ones.

Lack of Anonymous Payment

One more thing to keep in mind: if you want to add an extra layer of obfuscation, you might prefer a VPN service that takes anonymous payments. Whereas a credit card or PayPal account can be traced back to you, cryptocurrencies like Bitcoin don't leave such a breadcrumb trail to follow.

Which VPNs Should You Avoid?

8 Bad VPNs You Must Avoid to Protect Your Privacy (4)

It's one thing to speculate whether a particular VPN service is safe or unsafe based on what they say and what they promise. It's something else altogether when a VPN service is caught red-handed as far as tracking activity, keeping logs, selling user data, etc.

If you value your privacy, here are the VPN services to avoid—ones that have been shown and proven to violate user privacy in one way or another.

1. Hola

Back in 2015, Hola was found to do something that no other VPN service does: turn the PCs of its users into "exit nodes," allowing other Hola users to route their traffic through said nodes. Hola sold this bandwidth to a third-party service. A violation this egregious puts Hola squarely in the category of services to NEVER use ever again.

2. HotSpot Shield

In 2017, a privacy group made a claim against HotSpot Shield for "intercepting and redirecting traffic to partner websites, including advertising companies." This claim accused HotSpot Shield of logging connection details, which directly went against its privacy policy.

Additionally, a 2016 research paper had previously found HotSpot Shield "injecting JavaScript codes" and "redirecting e-commerce traffic to partnering domains."

3. HideMyAss

In 2011, the Federal Bureau of Investigation tracked a hacker's activities back to an IP address belonging to the HideMyAss VPN service. The FBI acquired activity logs from HideMyAss and used them to catch and prosecute the hacker. Despite the illegality of the hacker's actions, this incident made one thing clear: HideMyAss does keep traceable logs.

4. Facebook Onavo VPN

In early 2018, it came to light that Facebook's built-in "Protect" feature for mobile apps was really just the Onavo VPN it acquired back in 2013.

Regardless of how effective it is at protecting users, there's one thing that ought to deter you: Onavo will collect your mobile traffic data to "improve Facebook products and services, gain insights into the products and service people value, and build better experiences."

5. Opera Free VPN

In 2016, the Opera browser introduced a new "free unlimited VPN" feature available to all users. But despite the naming, Opera Free VPN is not a VPN in the truest sense. It's more like a web proxy, and Opera does collect usage data that may or may not be shared with third parties.

6. PureVPN

In 2017, the Federal Bureau of Investigation tracked and arrested an alleged stalker after acquiring information on his activity using the PureVPN service. Despite PureVPN's no-logging promise in its privacy policy, it turned out that they kept enough information to be able to identify the accused when cooperating with legal authorities.

7. VPNSecure

Not only is VPNSecure headquartered in Australia (a "Five Eyes" country), but a 2016 research paper found IP leaks and DNS leaks with the service, plus "egress points" for residential users, which is similar to the "exit nodes" concept that sunk Hola above.

The paper suspects but does not confirm that the bandwidth of users may be being used without their knowledge. However, if you want to be safe, you should probably stay away.

8. Zenmate

In 2018, a test by vpnMentor found that ZenMate (along with HotSpot Shield and PureVPN) suffered from IP leaks, which could give away your identity even when using the internet with an established VPN connection through ZenMate. This, coupled with the fact that ZenMate was slow to respond to these findings, makes us wary of their respect for user privacy.

Privacy-Conscious VPNs You Can Trust

As of now, there are only a handful of VPNs with no-logging policies that privacy-minded folks trust. To learn more about what to look for in a VPN, see our advice on how to choose a VPN provider.

We recommend ExpressVPN, CyberGhost, and Private Internet Access.


8 Bad VPNs You Must Avoid to Protect Your Privacy (2024)

FAQs

Why VPNs are unsafe? ›

It can't prevent cookie tracking, viruses, or malware, and it can't protect against phishing scams. Data leaks could occur. But most pivotally, a VPN is only as secure as the company that runs it. A VPN provider that uses out-of-date protocols, leaks IPs, and logs your data isn't one you can trust.

What will a VPN not protect? ›

VPNs are not designed to protect your device from malware, viruses or other cyber threats. They secure your data transmission and mask your online identity, but they don't have the ability to scan or block malicious software. Therefore, it's essential to use additional security measures alongside a VPN.

Why is VPN not recommended? ›

When using a VPN, the only encrypted part of the connection is from you to the VPN provider. From the VPN provider onwards, it is the same as it would have been without a VPN. And remember, the VPN provider can see and mess with all your traffic.

When I shouldn't use VPN? ›

  1. Sometimes decreases internet speeds.
  2. Possibly blocks some content.
  3. Potentially jeopardizes your security if the VPN collects user data.
  4. Illegal in some countries.

Are VPNs illegal? ›

Yes, VPNs are legal in most countries around the world, including the US, Canada, and most of Europe. However, you might risk heavy fines or even imprisonment for using a VPN in a country that bans it, for example, North Korea or Iraq.

Can VPNs get viruses? ›

8 Ways You Can Still Get Viruses While Using a VPN. VPNs mask your IP address and your data while it's in transit, but they can't protect you from every online threat. Regardless if you're using VPNs on iPhones, Androids, or any other devices, you still need to practice good internet hygiene to stay safe online.

Can VPN be tracked by police? ›

Whether police can track VPN traffic is a common concern among users seeking online privacy. The truth is: the police can't monitor encrypted VPN traffic. However, they can ask your Internet Service Provider (ISP) to provide connection or usage logs through a court order, which can lead them to your VPN provider.

Can VPN see what I'm doing? ›

Final thoughts. Any VPN service can monitor your browsing history, but reputable ones won't and will ensure they have no logs of your browsing history that could be handed over to third parties. That way, if they receive a court order to share information, it's impossible for them to comply.

Does a VPN hide your phone number? ›

Your identity on social media is tied to the information you've shared about yourself (such as your name, email, or phone number). Using social media while connected to a VPN means you're generally safer online — but a VPN doesn't hide your identity from the social media provider or other users.

Should I leave my VPN on all the time on my phone? ›

Yes, you should leave your VPN on all the time. VPNs offer the best online security, so keeping it on will protect you against data leaks and cyberattacks, especially while you're using public Wi-Fi. It can also safeguard against intrusive snoopers such as ISPs or advertisers. Always use a VPN when you go online.

Should I leave my VPN on all the time on my iPhone? ›

Should a VPN on an iPhone be on or off? You should keep your VPN turned on when you're online. But you may want to reduce VPN usage if your limited data plan is nearing its limit.

Is there anything better than VPN? ›

One of the best alternatives to a VPN is a proxy server. A proxy server acts as a gateway that sits between a user's device and the internet. The user can activate the server in their web browser and proceed to reroute their traffic through it. This helps to hide their IP address from any web servers that they visit.

Do free VPNs sell your data? ›

Do all free VPNs sell your data? No. Not all free VPNs sell your data, but it's important to note that they typically rely on other revenue options, such as ads, since they don't charge a subscription fee. VPNs aren't free to run — the infrastructure costs money, so the providers need to get that money somehow.

Are free VPNs bad? ›

Using a free VPN online can be bad for several reasons. Here are some potential issues: Security risks: Many free VPNs have been found to contain malware or other malicious software that can harm your device or steal your data. They may also log your activity and sell that information to third parties.

Why do companies hate VPNs? ›

Businesses may expect users not to use a VPN to log in to their website while they use a VPN themselves for several reasons: Security Concerns: VPNs can be used to hide a user's true location and identity, which raises security concerns.

Is it OK to use VPN all the time? ›

Yes, you should leave your VPN on all the time. VPNs offer the best online security, so keeping it on will protect you against data leaks and cyberattacks, especially while you're using public Wi-Fi. It can also safeguard against intrusive snoopers such as ISPs or advertisers. Always use a VPN when you go online.

Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 5996

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.