


We got answers from Joseph Jerome, then the policy counsel for the Center for Democracy & Technology’s privacy and data project, about how accountable VPNs were for their business models, privacy practices, security protocols, and protections, and how that related to trustworthiness. We spoke with Trail of Bits co-founder and CEO Dan Guido about the security challenges inherent in VPNs and the limitations of security audits and reports. We interviewed Eva Galperin, Electronic Frontier Foundation’s director of cybersecurity, about the limitations of VPNs and tips for selecting the appropriate VPN based on individual circumstances.
