Can VPNs Protect You from Government and Police Tracking?
VPNs are often portrayed as a shield against government and police surveillance, but their real effectiveness depends on far more than encryption alone. Jurisdiction, logging practices, device security, and investigative methods all shape what authorities can still see. While VPNs can meaningfully reduce mass surveillance and ISP level tracking, they are not designed to defeat targeted investigations. This article explains what protection VPNs actually provide against governments, where the limits lie, and how different VPN models change the risk.
Key takeaways
- VPNs reduce mass surveillance by encrypting traffic and hiding IP addresses, but they do not prevent targeted government investigations.
- Centralized VPN providers can be legally compelled to hand over logs, metadata, or account information depending on jurisdiction.
- Governments rely on metadata, device access, platform cooperation, and human error rather than VPN traffic alone.
- Decentralized VPNs limit data exposure by design, reducing the effectiveness of subpoenas and centralized surveillance pressure.
A Virtual Private Network (VPN) is a tool designed to encrypt your internet traffic and mask your IP address, shielding some of your online activities from prying eyes. While most choices in the market are considered centralized VPNs, where a single provider controls the servers, there’s also a lesser-known alternative: decentralized VPNs (dVPNs). These operate on peer-to-peer networks, distributing data across multiple nodes for enhanced privacy.
Can a VPN be tracked by a government? Yes, governments can track VPN users, but the extent of their access depends on the VPN’s infrastructure, security protocols, the jurisdiction it’s based in and finally the methods employed by the authorities.
VPNs can protect you from the government by encrypting your internet traffic, hiding your original IP address, and preventing direct surveillance of your online activities. However, authorities, including the police, might still identify your actions online through data leaks such as a DNS leak, metadata, cooperation with VPN providers, or by accessing your devices physically.
Beyond law enforcement, intelligence agencies, national cybersecurity bodies, and state-backed ISPs are also equipped with tools to monitor and track online behavior, even with VPNs in place. In this article, we’ll break down how these authorities attempt to bypass VPN protections but how VPNs, despite their limitations, remain a vital tool in minimizing government surveillance.
How are government authorities tracking you?
Government authorities have a range of tools and methods at their disposal to monitor and track individuals online, and these mechanisms are often deeply integrated into national cybersecurity infrastructures. At the most basic level, Internet Service Providers (ISPs) act as the primary gateways to user data, logging browsing activity, IP addresses, and connection timestamps.
Governments often have legal authority to request or demand this data from ISPs, either directly or through court orders. In democratic countries, law enforcement has to provide concrete evidence to a court of law that raises suspicion of wrongdoing. If this evidence is sufficient, a court order for the ISP to provide information on a specific individual or IP address is issued. In turn, if this information is a cause for more suspicion of crimes committed by the individual in question, another warrant is usually asked for in court to allow for the seizing of the individual’s electronic devices, which are then accessed by decrypting their hard drives, as outlined by attorneys at law, Moermond & Mulligan.
Surveillance programs, such as the NSA’s PRISM in the United States, exemplify large-scale government access to user data collected through partnerships with telecom providers and tech giants such as Google, Apple, or Facebook, according to a report by the Guardian.
Intelligence agencies and cybersecurity divisions further monitor internet traffic through deep packet inspection (DPI), a technology that allows them to analyze and filter data packets passing through a network. Numerous examples of this technology used by authoritarian governments to prosecute people already exist. For example, in 2011, the communications of opponents to Muammar Gaddafi’s Libyan regime were tracked using DPI software procured from a French company, as revealed by the Wall Street Journal.
Law enforcement agencies, including the police, frequently request data from ISPs and social media platforms during investigations. In authoritarian regimes, internet censorship and surveillance are tightly controlled, with governments having a more direct connection to ISPs, together with the state-approved VPNs that are used in attempts to circumvent government tracking. State-backed hacking groups also play a role, exploiting weaknesses in devices and software to access personal information.
Without tools like independent VPNs to encrypt traffic and obscure IP addresses, regular internet users are highly vulnerable to these surveillance techniques, often without even realizing the extent to which their online activities are monitored and recorded.
How can a VPN protect you from law enforcement agencies?
Law enforcement agencies, such as police departments, the FBI, INTERPOL, and other national and international authorities, are government bodies tasked with investigating criminal activities, enforcing laws, and maintaining public order. Most investigations they carry out delve into the past and involve examining digital footprints left by suspected criminals.
A VPN protects you from law enforcement agencies by encrypting your internet traffic, masking your IP address, and preventing ISPs from providing detailed records of your online activity, making it significantly harder for authorities to monitor or trace your digital footprint. Without a VPN, your internet traffic flows directly through your ISP, possibly leaving a trail of websites visited, apps accessed, or other activities performed. These could be retrieved by law enforcement agencies, including local police departments, and other national or international authorities.
By routing your traffic through an encrypted VPN tunnel, your ISP (and consequently, law enforcement agencies) can only see that you’re connected to a VPN server, not your final online destinations. This makes it far more difficult for authorities to establish a detailed timeline of your online behavior.
However, it’s crucial to recognize that while VPNs are powerful tools for improving privacy and evading mass surveillance, they are not foolproof against high-priority investigations, sophisticated surveillance techniques, or simply, human error. VPN effectiveness largely depends on factors like VPN provider trustworthiness, jurisdiction, and whether VPN logs are stored. In the sections ahead, we’ll explore specific cases involving agencies such as the DEA, the U.S. Secret Service, local police, and INTERPOL, illustrating both the strengths and limitations of VPN protection in different investigative scenarios.
VPN vs. police
A VPN can significantly enhance your privacy against police surveillance by encrypting your internet traffic and masking your IP address. This makes it much harder for law enforcement agencies to track your online activities, identify your physical location, or monitor the websites you visit. If you attract attention, it will not be very easy to find out who you are. Law enforcement will have to use more complex methods of finding you than simply looking at your IP address. The contents of your internet traffic won’t be visible to them, as they will be encrypted.
The IP address you use might be connected to a particular VPN using existing lists of IP addresses used by the major VPN providers. If the VPN provider in question keeps logs and falls under a relevant jurisdiction, law enforcement can subpoena those records to gain insight into your online behavior. Using a decentralized VPN on the other hand reduces this risk quite a bit, as it’s much harder for law enforcement to identify an IP address belonging to a dVPN in the first place, and the VPN provider is much less likely to have logs to hand over to them.
How do the police track VPN users?
As mentioned before, the Police have to turn to unconventional measures when tracking VPN users. The U.S. police departments are known to turn to Google to gather lists of users searching for terms related to crimes, such as the address of a home where a murder took place, according to the Washington Post. If a VPN user made that search while connected to a Google account, the tech company would still be able to identify a pile of information connected to that person, as they probably use various different Google services.
If you send communications, upload files, etc., the police can still gather metadata (hidden file attributes) from those actions. Images uploaded to the web, for example, can include the GPS coordinates of where the image was taken.
VPN vs. FBI
A VPN provides similar protections against the FBI as it does against local police, primarily by encrypting your internet traffic and hiding your IP address. This makes it difficult for authorities to monitor your online activity directly. However, the FBI has access to more advanced surveillance tools and broader legal authority than most local police forces.
For example, they have more freedom to access data gathered by tech giants such as Google, Facebook, or Apple, meaning that they can basically find out anything they want about you if you maintain a big digital footprint.
Any good VPN can help obscure your IP address and location, making it more difficult (and time-consuming) for the FBI to identify you using IP-based tracking methods. However, it doesn’t make you completely anonymous, especially if other identifying data is available. Using a decentralized VPN might be even better option, as it’s more difficult to identify the IP addresses belonging to them and even more challenging to receive any usable data about you from the VPN provider, due to their decentralized structure.
How does the FBI track VPN users?
The FBI has access to one of the most powerful tracking tools of the 21st century: NSA’s PRISM. This tool, launched in 2007 according to the Guardian, provides FBI and other government agencies direct access to the servers (and, in turn, user information) of the biggest tech companies in the U.S.: Microsoft, Yahoo, Google, Apple, Facebook, Youtube, Skype and more. By using this initiative, agencies like the FBI can circumvent the legal processes normally required to subpoena information about suspects. Having in mind how much these companies normally know about us, this probably provides more information than an interview with your significant other, once the FBI knows your identity.
With that in mind, while it can look like a basic and outdated way to gather facts, witness testimony is still as relevant as ever when finding perpetrators. The FBI has had great success of identifying the participants of the 2021 U.S. Capitol riots in no small part due to tips from the people closest to them, according to the Washington Post. The suspicious actions you take online can also be reported by your friends or family members to the FBI or other law enforcement branches, if they take notice.
Pattern recognition is also a useful technique for a law enforcement agency with such experience as the FBI. According to the FBI themselves, they possess a huge database based on reports on actual cybercrime. Once a repetitive crime is reported enough times (such as a phishing email), a certain pattern of clues can be found from the metadata or circumstances of the crime: email service used, device, timestamp, system settings of the sender or others.
VPN vs. other law enforcement agencies
VPNs can help protect users from international organizations like Interpol or Europol, as well as U.S. federal agencies such as the DEA, ATF, ICE, and the Secret Service, by encrypting internet traffic and masking IP addresses as well. This makes it harder for these agencies to directly trace your online activity back to you, particularly for routine surveillance. However, these agencies often collaborate with other governments and tech companies, leveraging international legal frameworks and advanced tools to access data indirectly, such as obtaining logs from centralized VPN providers through subpoenas. Decentralized VPNs can provide an added layer of protection by using a peer-to-peer network, making it significantly harder for these agencies to identify the VPN used and receive data about you from the provider. Using a dVPN against such surveillance can substantially reduce exposure.
How can a VPN protect you from other government authorities?
VPNs can protect you from government agencies and governments themselves all over the world. These can be intelligence agencies like the CIA or the NSA, financial crime authorities such as the EBA or FCA, national data protection authorities and more. By encrypting your internet traffic and concealing your IP address, a VPN makes it challenging to identify who you are and what you do on the web. There are other methods of how government agencies can track you that we talk about later on, but a VPN is an excellent tool to start with, a piece of armor you don’t go to battle without.
The important thing to make sure that your VPN can’t work against you is to choose one that is based outside of countries part of the Five Eyes, Nine Eyes, or Fourteen Eyes alliances. These agreements are based on free information sharing between government authorities. For example, if a crime was committed against citizens of country A but using the internet connection from country B, agencies in country A could then receive information from the country B’s internet service provider. That is extremely relevant if you don’t use a VPN, but can also happen with using it, as government agencies can subpoena VPNs too. A decentralized VPN can protect you better in this case, as they have less means to collect logs about you due to their infrastructure.
Limitations of VPNs in preventing government tracking
VPNs aren’t impenetrable shields against government surveillance. There are certain aspects of your privacy that a VPN will do little to nothing to protect against. Metadata tracking is the first example. Even if your internet traffic is encrypted, metadata is still being created by a lot of actions that you take online and can be monitored by government agencies. Good examples of metadata for an email sent could be: sender/receiver email addresses, the timestamp of when the letter was sent, the email service used, etc. They can reveal patterns of activity, helping authorities infer user behavior and encourage further investigation.
Secondly, VPN providers could collect user logs. Centralized VPNs are under legal jurisdiction in the countries where they operate. Governments can pressure providers to hand over data, and if a VPN keeps connection or activity logs, they will most likely have to be handed over. In contrast, dVPNs minimize the probability of usage log collection by routing traffic through nodes owned by individuals, not the VPN provider itself.
Probably the most advanced technique government agencies employ is deep packet inspection (DPI). This internet traffic analysis technique can detect VPN usage by monitoring the size, timing, and patterns of encrypted data packets (it can also analyze unencrypted data for much more detailed results). While the content of the traffic remains hidden under a VPN, the patterns can still provide insights into the user’s activity, such as whether they’re streaming, browsing, or engaging in file-sharing.
Another way to circumvent a VPN and track you is to access the device you are using. VPNs only protect data while it’s in transit between your device and the internet. If tracking software is installed on your device, either by fooling you into thinking it’s something else or accessing the device directly, authorities can bypass VPN encryption entirely and monitor your activity directly on the device. The same applies if your device is taken from you - data inside can be seen after hacking your password or using a backdoor to get in.
Compromised VPN nodes or servers might help government agencies see you as well. For centralized VPNs, if a server is seized, hacked, or otherwise compromised, user traffic passing through that server can be monitored or manipulated. Server security keys might also be stolen, which could then be used to set up fake VPN servers. dVPNs are more resistant to this since individual nodes are much smaller targets, but they can still be attacked if their operators lack proper security measures.
VPN leaks are an issue for users of free or incorrectly configured VPNs. DNS, IP, or WebRTC leaks can uncover your browsing activity to law enforcement. For example, a DNS leak happens when your DNS requests are resolved not by the DNS servers of your VPN, but by those of your internet service provider, for example. If that happens, your ISP would have a pretty good idea of what websites you are visiting and would then have a list to hand over to government agencies if asked.
Finally, tracking pixels are mostly used by online advertisers, however, they could theoretically be used to trick you into unwillingly giving out information. Tracking pixels are tiny image files embedded in a web page or an email and record information about the visitor/opener of said item. If law enforcement is interested in you and know your email address, they could send you an email with a pixel in it. If you open the email, the pixel could record information such as your time zone, device information, IP address, or more. A VPN would of course conceal your IP address, but not anything else. To avoid this kind of tracking, you should disable automatic loading of external images in your email settings, which prevents the pixel from being triggered when the message is opened.
Be aware of these risks when using a VPN if you are wary of government tracking. A VPN is not an all-in-one tool for ensuring your privacy and these techniques could be used to reveal your identity or actions on the web.
Real-world examples of VPNs and government tracking incidents
Certain real-world examples of VPNs protecting people from actions by abusive, authoritarian governments do exist. Human rights activists in such countries have adopted VPNs as one of their main tools to protect their identity online and facilitate communications with the outside world. Even Amnesty International calls VPNs “a key enabler of human rights online”. Mohamed Al-Maskati is an activist from Bahrain who, together with uncovering human rights abuse in the Middle East and organizing protests, educates non-tech savvy people about VPNs and their role in protecting privacy against government inquiries. As a VPN user himself, he described VPNs as an essential tool for fighting government surveillance and improving accessibility in his interview with ExpressVPN.
Journalists are another group vulnerable to government tracking. The role of VPNs in protecting all citizens’ privacy from the Russian government is crucial, according to Tonia Samsonova, a Russian media entrepreneur, as outlined in a Washington Post piece. Journalists are even more at risk. Tanya Simakova, an independent Russian journalist, said that her whole team uses VPNs for their work in her interview with Bumaga. Even journalists located in Ukraine while reporting on the war are at risk, which is why Runa Sandvik, a white-hat hacker specializes in educating less experienced journalists about cybersecurity and hands out VPNs as a go-to tool, which she shared revealed in an interview with The Record. This strategy of protecting against ISP-based surveillance is logical, as Russian ISPs collect and store communications records for 6 months, while metadata is stored for 3 years for government access, according to by Galina Arapova, director of the Mass Media Defense Center in her address for the Privacy Day 2024 conference.
Can VPN providers share your data with the government?
Yes, VPN providers can share your data with the government if they are legally compelled to do so, especially when given court orders or in jurisdictions with strict data retention laws. While many VPN services advertise their no-logs policies, the reality is that they usually only cover so-called usage logs - records of your exact internet activity while connected to the VPN. If a provider retains any kind of user metadata or connection logs (and they usually do), authorities can use legal pressure to access this information. In regions with heavy surveillance requirements, like the Five Eyes, Nine Eyes, or Fourteen Eyes alliances, VPN companies are often required to comply with data-sharing laws, even if they contradict their privacy claims.
A few real examples of centralized VPNs handing over their customer data to law enforcement do exist. For example, in 2016, IPVanish handed over logs of a child abuse suspect when requested by the Department of Homeland Security, as outlined in an Cyber Insider article. Another breach of centralized VPN trust happened in 2017, when PureVPN gave out logs connected to a particular user account, according to a U.S. court affidavit. These logs, requested by the FBI, belonged to a person suspected of cyberstalking and other crimes. There is no doubt that more instances of such successful subpoenas exist, especially in authoritarian countries where only state-approved VPNs are allowed.
The no-logs policy is one of the most promoted features of centralized VPNs, but in practice, it often lacks transparency. Providers might claim they don’t store logs, but some data could still be recorded: connection timestamps, IP addresses, device information. In cases where a provider operates in a jurisdiction with government surveillance mandates, even a no-logs policy can’t prevent compliance with a legal subpoena. Without external audits or clear transparency reports, users have little way of verifying these claims. Measures like warrant canaries do exist - an indirect way to notify users of receiving a subpoena from law enforcement. VPNs, if asked for user information, cannot make such request act public, as that could affect the ongoing investigation. However, if a specific page (the warrant canary) that, for example, says “the FBI hasn’t been here” stops saying that, changes color, or stops existing altogether, it’s a clear sign that data was given to a law enforcement agency. This act, of course, is based on the mutual trust between a VPN and its users and carries no guarantees whatsoever - a VPN can simply fail to update a warrant canary when relevant, there is no liability in play.
This is where decentralized VPNs (dVPNs) offer a significant advantage. Unlike centralized providers, dVPNs are built on peer-to-peer networks, where user data isn’t routed through a single central authority. Because there’s no single point of control or storage, dVPNs have the technical means for a genuine no-logs policy by design, making it significantly more difficult for governments to force a data handover. The service provider would have much difficulty seeing what its users are doing on the web, as the node they are connected to does not belong to them, so there’s nothing to share with law enforcement. While no tool guarantees absolute privacy, dVPNs represent a more resilient and transparent solution against government demands for user data.
What user data can VPNs provide to the government?
The exact data types a VPN could provide to the government depend heavily on the VPN provider’s logging policy, jurisdiction, and whether they’re centralized or decentralized. With that in mind, this is the most common data a centralized VPN could hand over:
- Connection logs: timestamps of when a user connected to and disconnected from the VPN service.
- Session duration: total time spent connected to the VPN during a session.
- IP addresses: the user’s original IP address and the VPN server IP they connected to.
- Bandwidth usage: the amount of data transferred during a session.
- Device information: data about the user’s device, such as operating system and hardware identifiers.
- Account information: email address, username.
- Payment records: billing and transaction details, including payment method and billing addresses, if not anonymized via cryptocurrency or cash payment.
- Usage logs (if recorded): Specific websites visited, apps accessed, or files downloaded.
Some centralized VPNs record, and could subsequently hand over extremely personal data. In 2020, VPNMentor found an unsecured database belonging to 7 free no-log VPN services that contained:
- Connection and usage logs
- Actual user location
- ISP details
- Device type, model, and ID
- Unencrypted username and password
- Customer support chats
- Actions taken in the VPN client (e.g. password change)
- Detailed payment information
Even if a VPN claims to have a no-logs policy, there is no telling what data they could actually be collecting. We highly recommend using a dVPN with a no-logs policy, as only a decentralized service could actually guarantee no sensitive data collection.
How to minimize government tracking with a VPN?
A VPN is good at bettering your privacy, however, it does have its drawbacks. There are certain steps you can take when using a VPN to minimize the probability of being tracked by the government. In addition, there are additional tools you can use in conjunction with a VPN to improve your chances even further. Read our advisory list of steps to avoid VPN detection below:
- Choose a safe VPN provider: Go for a VPN with no previous privacy scandals, a strict no-logs policy that has been audited independently and gathers the least amount of data possible according to their privacy policy.
- Enable strong encryption protocols: Use VPN protocols like WireGuard or OpenVPN, which offer advanced encryption, better resistance to tracking techniques, and also don’t slow down your connection in a noticeable way.
- Avoid free VPNs: Free services almost always come with compromises, such as logging your data or serving ads, which can undermine your privacy. They are also extremely susceptible to leaking your data, which can be found by government agents.
- Use a decentralized VPN: Unlike traditional (centralized) VPNs, dVPNs distribute traffic across independent nodes, making it harder for authorities to shut down your connection or get data about you.
- Enable the kill switch function: This feature cuts your internet connection if the VPN drops, preventing accidental data leaks.
- Don’t share unnecessary information: Refrain from sharing real, personal information anywhere you don’t absolutely need to. This applies to social media, forums, entering your address, phone number, or similar when signing up on a website.
Together with the steps above, try out these tools to decrease the chances of government tracking according to your needs:
- Privacy-focused browsers: Use browsers like Brave with strict privacy settings enabled to block trackers, cookies, and similar.
- Clear your internet history and cookies. Delete these traces of past internet activity on your device from time to time.
- Ad blockers and anti-tracking extensions: Browser extensions like uBlock Origin and Privacy Badger prevent tracking scripts or browser fingerprinting that cannot be stopped with a VPN.
- Encrypted messaging apps: Opt for tools like Signal or Threema to ensure your communications remain private.
- Tor browser: If you really need extra protection, you can use either Tor browser or Tor over VPN. Tor routes your traffic through multiple encrypted nodes, adding another layer of anonymity. However, it slows down your connection speed by a lot and the FBI might start tracking you just for the reason of using it - Tor is a popular tool for criminals and is watched by law enforcement.
- Secure operating systems: In case of an extreme need for privacy, you might even consider using privacy-focused operating systems like Tails OS or Qubes OS.
While no solution or their combinations guarantee total anonymity, these tips significantly reduce the chances of being tracked.
When is it illegal to use a VPN against the government?
Using a VPN becomes illegal when it directly violates national laws, bypasses state-imposed restrictions, or facilitates illegal activities. In general, VPN use crosses into illegal territory when it undermines government control over information, communication, or cybersecurity regulations. There are two main scenarios when using a VPN is considered illegal:
- Bypassing internet censorship: Accessing restricted content or websites blocked by government firewalls in countries like China, Iran, or North Korea. In 2023, a Chinese programmer who was using a VPN to work for a Turkish company got all of his earned funds confiscated, the Guardian reports.
- Accessing banned social media: Using VPNs to access social media platforms or messaging apps banned by the government. This includes attempts to circumvent temporary social media bans during times of social strife, such as protests after a disputed election. For example, as of 2024, using a VPN to access X (formerly Twitter) in Brazil could result in an almost $9000 fine for each day of use, according to Yahoo.
Some countries impose varying levels of restrictions on VPN usage, ranging from partial limitations to outright bans. You should always be aware of local laws to avoid legal consequences. See an extensive list of countries that restrict the technology in the next section.
Countries where VPN usage is prohibited or restricted
VPN regulations vary widely across the globe, with most countries fully embracing their use, while others heavily restrict or outright ban them. The general rule of thumb is that Western democratic countries allow VPN use, poorly developed countries usually don’t have any legislation affecting the technology, and dictatorships restrict them. Below is an overview of countries where VPNs are not fully legal:
| Country | VPN Status | Comments |
|---|---|---|
| Belarus | Illegal | VPNs are banned, and violators can face fines. |
| Brazil | Illegal when accessing X social network | It’s only illegal to use a VPN to access the X social network, which has been banned in 2024. |
| China | Restricted | Only state-approved VPNs are legal; unauthorized use can result in fines or other penalties. |
| Egypt | Restricted | Many VPNs and proxy services are blocked under claims of national security. |
| Iran | Restricted | Using non-approved VPNs is banned; violators face penalties. |
| Iraq | Illegal | VPNs are prohibited, but enforcement is inconsistent. |
| Jordan | Restricted | The country is known to enact temporary VPN restrictions during times of unrest. |
| Myanmar | Illegal | Internet access is heavily controlled, and VPNs are explicitly banned. |
| North Korea | Illegal | VPNs are entirely banned, with internet access restricted to government-approved users. |
| Oman | Illegal | VPN use is allowed only with government approval; misuse carries heavy fines. |
| Pakistan | Banned | VPNs were banned in 2024 and also declared “unislamic” by the governing religious institution. |
| Russia | Restricted | VPNs must comply with state surveillance laws, undermining privacy. |
| Sri Lanka | Restricted | VPNs are sporadically restricted. Some ISPs don’t allow their use and the government had temporarily banned VPNs after a 2019 terrorist act. |
| Turkey | Restricted | Many VPN services are blocked, and internet censorship is widespread. |
| Turkmenistan | Illegal | The government controls all internet activity and prohibits VPN use. |
| UAE | Restricted | VPNs are legal for approved uses but banned for VoIP services. |
| Uganda | Restricted | VPNs aren’t illegal but are actively being fought by ISPs as part of the government’s internet censorship efforts. |
| Uzbekistan | Restricted | Internet censorship is applied by the government, with VPNs being blocked but not strictly illegal. |
| Venezuela | Restricted | ISPs sporadically ban mainstream VPN services from time to time, although they are not illegal by law. |
VPNs are the great equalizer: they enable viewers’ access to content banned or restricted in their area, allow activists and regular people to resist authoritarian and totalitarian governments, and provide extra safety when using the web in most cases. However, their effectiveness has also attracted bad actors, who have adapted the tool to improve their privacy when committing cybercrime. As such, it’s unclear whether VPNs have made the internet better or worse as a whole. One thing is certain, though - a VPN is the most accessible tool you have to protect yourself against government interference.