Blog post: Online security

![]()
A free VPN can feel like a simple shortcut to “stay protected” online, especially on public Wi-Fi or when you want to access a service from abroad.
In practice, “free” rarely means “no trade-off”: infrastructure is expensive, and the money has to come from somewhere.
Between intrusive business models and malicious fake VPNs, the line between a useful tool and a digital risk can be thin. Understanding what a VPN really does (and what it doesn’t) helps avoid unpleasant surprises.
A VPN (Virtual Private Network) creates an encrypted tunnel between your device and a server run by the VPN provider. Your internet service provider (ISP) and people on the same local network (for example, in a café) have a harder time seeing the contents of your traffic, and the IP address websites see is often the VPN server’s IP.
However, a VPN doesn’t make you “anonymous” by magic: the VPN provider can potentially see some of your traffic, and certain activity can still be traced (logged-in accounts, cookies, browser fingerprinting). Finally, a VPN doesn’t replace an antivirus, or basic caution around scams and fraudulent websites.
Running a server network, bandwidth, support, and a secure app has a real cost. When a VPN is free, it usually relies on an alternative funding model, more or less transparent. Some models are “acceptable” if clearly disclosed; others create a direct risk for privacy and security. The key is to understand what the provider is really “selling”: the service, or the user.
The word “VPN” inspires trust, but it isn’t an official label that guarantees protection. In the mobile and desktop ecosystem, you’ll find serious players… and opportunistic, even malicious apps. The risk isn’t just theoretical: by definition, a VPN sits in a central position for your traffic. If it’s poorly designed, overly curious, or deliberately abusive, it can create more problems than it solves.
“Data collection” is often discussed in abstract terms, but the impact is very real. A free VPN may monetise your usage through ads, but also via more intrusive mechanisms: profiling, sharing with partners, or using your device as a network relay. And in the worst case, a fake VPN can act as a spying tool. Here are the most common scenarios—without exaggeration, but with clear-eyed realism.
Some free VPNs fund their servers by collecting usage information: frequency, duration, device type, sometimes network metadata. Even if page content is encrypted with HTTPS, some information can still be exploited (for example, which apps communicate, when, and with which services). The problem isn’t having “zero data”, but having collection that is proportionate, explained, and limited. When the policy is vague, the user can’t assess the trade-off.
A VPN can technically influence how certain pages load, notably via proxies or DNS configuration. Without drifting into paranoia, there are cases where free services insert banners, redirect to partner pages, or alter browsing results. Beyond annoyance, this can become risky if the user is pushed toward deceptive sites, fake downloads, or ambiguous subscription offers.
This is the most serious concern: apps present themselves as VPNs, but are actually a front. They may log traffic, push unwanted software, or use the device as a transit point. Just because an app has “VPN” in its name proves nothing: consider the publisher, their track record, transparency, and trust signals (audits, reputation, a clear policy).
Even without malicious intent, a free VPN can be fragile: poorly implemented encryption, DNS leaks, no kill switch, saturated or unstable servers. Frequent instability can cause silent dropouts: the user thinks they’re protected, but is actually browsing in the clear on the local network. This risk is subtler, but very common with low-end services.
There’s no perfect method, but a few simple signals help you sort the safer options from obvious traps: untraceable publishers, impossible promises, and ambiguous policies. The goal isn’t a forensic investigation—just avoiding the clear pitfalls. A “serious” VPN accepts scrutiny, documents how it works, and explains what it collects. A “dubious” VPN often relies on empty marketing and a very thin website.
Sometimes a free VPN is a pragmatic choice: a one-off fix, public Wi-Fi, or testing a service before subscribing. In that case, limit your exposure. A free VPN shouldn’t be your only “security layer”; it’s one tool among others, to be used with guardrails. And if the use becomes regular, a modest paid provider with clearer policies is often a healthier long-term compromise.
A VPN isn’t always necessary. If your goal is to secure public Wi-Fi, HTTPS and basic caution already cover a large share of the risk. If your goal is to reduce tracking, privacy settings, tracker blockers, and good digital hygiene can be more effective than a free VPN. If you truly need a VPN, modest paid plans (with clear policies) can be a healthier compromise over time.
When a service looks misleading (hidden subscriptions, false promises, excessive data collection, or a suspicious app), it helps to rely on recognised organisations. These resources can reinforce good habits, help you report a scam, or provide prevention guidance. For the United Kingdom and the United States, several official platforms exist with clear, public-friendly steps.
A free VPN can be useful, but it deserves a realistic view: funding almost always implies a trade-off, and the VPN becomes a powerful intermediary between you and the internet. The main risk isn’t “VPNs in general”, but opacity and bad practices: excessive collection, redirections, unrealistic promises, or malicious fake VPNs. The best defence is a combination of simple checks, solid digital hygiene, and a good reporting reflex when something looks abusive.
Useful links: