A good VPN has no usable data to give the government upon subpoena.
Your name need not be attached to the ISP. No proxy is needed (although even a proxy significantly breaks the chain). There is no way to determine which devices you use if there is no identity tied to the devices. And you still have device spoofing if you wanted.
Login to reply
Replies (1)
It has to follow the Free Software ethos (Proton, IVPN, and Mullvad come to mind), and do it well. I know @Neigsndoig IQ 120 and myself had done this in the past, though he's done it for at least 8 years, if not 9 at this point.