> “Your IP is used for tracking and leaks private information. You should hide it.”<p>There is a lot of marketing, agreed. However, those messages do serve a purpose - they make it clear you configured that particular VPN correctly and that it works.<p>> IP addresses for user identification<p>Yes, there are more factors than just IP. Clear cookies, use uBlock Origin and HTTPS Everywhere, and know you can be tracked anyways, especially if you log in to the sites you have ever used without a VPN. For stronger privacy protections, use Tor Browser over Tor - Tor is better in terms of privacy, but due to Tor being heavily abused, a lot of services outright block Tor IPs or put you into reCAPTCHA hell, so it's not really suitable for day-to-day browsing, unlike a VPN you can set up and leave it turned on all the time.<p>> Location leaking<p>It's not always the case that the IP provides inaccurate information. Out of curiosity, I disabled the VPN, and went to <a href="https://www.privateinternetaccess.com/pages/whats-my-ip/" rel="nofollow">https://www.privateinternetaccess.com/pages/whats-my-ip/</a>. The guessed location was within 120 meters of an actual location, on the same street, in a big city. Sure, it doesn't point to an actual building, but it is dangerously close.<p>Just to be clear here, I don't use PIA as my VPN, they have a good demonstration of an issue however.<p>> “Network Encryption”<p>This is accurate. Part of why having HTTPS everywhere improves the security. Keep in mind however that SNI and the IP you are connecting to is not encrypted. This may change however soon (while you cannot really "encrypt" IP, a lot of websites are using services like Cloudflare, essentially preventing anyone on a path from guessing the website you are connecting to).<p>> What about “DNS leakage”?<p>The thing about DNS is that if you are using your ISP DNS while using a VPN, you are leaking an information about your ISP. To prevent DNS leaks, you should be using a DNS provider not provided by your ISP, and if you don't have any idea which DNS to pick, many VPNs provide their own DNS.<p>> The “no logs” thing<p>The article is arguing that paying with a payment card will leak your identity. This is true. Pay with cash, gift cards, or cryptocurrency (although this is a complicated subject, Bitcoin is tricky to pay privately with, I use Monero myself for VPN payments).<p>About logging, this is a complicated subject. The answer is: you have to trust the VPN. Read the privacy policy to tell how serious they are about "not logging anything". Generally, avoid any VPN that over-promises what it can do, a VPN is not "100% effective" whatever that means. Look out for conflicting messages in privacy policy, anything that goes "we don't log" and then later "except we log" should be avoided.<p>As for trusting your ISP - look, most ISPs don't promise "not logging", and in fact, where I live, they have an obligation to log.<p>In the end, don't rely on "no log" policy. It should be here, but assume the VPN is actually logging.<p>> Using a VPN does not make you anonymous.<p>Yes. If you violate the law, unless you are really careful, the law enforcement will find you. The police may be able to ask Google to provide details of an e-mail account using this IP address (from your VPN). VPN will however protect you people finding your IP address, contacting your ISP claiming to be a copyright owner needing user's details for a lawsuit - most ISPs will just give the details with this simple attack, and it doesn't matter whether you have downloaded or not, "no logs" VPNs won't.<p>In short, a VPN won't magically protect your address if you send it over the Internet. It cannot do that.<p>> Security issues in VPNs and their clients<p>Yes. All software can have vulnerabilities, this is nothing new. To improve your security, don't use the official VPN client but use an OpenVPN/WireGuard configuration file - if a VPN doesn't provide it, then don't use it.<p>> VPNs are a central point for attackers<p>So is your ISP. All software can have vulnerabilities.