Free VPN apps on Google Play turned Android phones into proxies

limerod@reddthat.commod to Android@lemdro.id – 134 points –
Free VPN apps on Google Play turned Android phones into proxies
bleepingcomputer.com
41

The only 3 good free unlimited options out there are ProtonVPN, RiseupVPN and BrightVPN(only for windows), limited ones Windscribe and PrivadoVPN(10GB per month).

These are the only good free options anything else it's a scam(you are the product) or you have to pay.

Another option maybe could be self-hosting in Oracle Cloud but it will not be anonymous at all, secure maybe but definitely not anonymous.

ProtonVPN, RiseupVPN and BrightVPN(only for windows), limited ones Windscribe and PrivadoVPN

Where did you get this idea?

Mullvad, IVPN, Perfect Privacy, and a few others have had independent audits of their no-log behavior and in some cases, law enforcement audits. They sure as hell don't proxy your traffic. They all accept Monero and cash. They all have multihop.

Edit: I see you said free. Yeah, I wouldn't trust a free VPN, regardless. If you're not paying for the product, you are the product.

I agree,

However I got to a point that I'm skeptical even with paid, well established products. I don't need VPN but if I did I'd try something based on onion routing.

You get a different IP from someone else who uses the VPN, and someone else gets to use yours. Sounds like a win-win to me in terms of both privacy and having an excuse for damning evidence. "Your honor, I assure you that 'giant horse cock' and 'how to make anthrax' were from someone else on the VPN network."

Yeah, I don't know how strong this defense would be when they put you on trial for CSAM.

"Your honor, I didn't distribute distribute CSAM. That was somebody else." and "Yes, your honor, I did sign that internet service contract agreeing that I am responsible for all activity that originates from my network."

Only if they're stating this upfront, in a giant text. Those apps hide this capability and are thus categorized as malware. Turning the victim's computer into a residential proxy has always been a staple in botnet operations.