In reply to Sharp:
> VPN's are only as secure as their end point, if you pay for it there's a payment trail leading from you to them and if you don't then how likely is it that they aren't selling your data on. How do you know they aren't selling your data anyway or that they're just about to be raided by their government for piracy? If you want to access a site that's blocked in your country or access content only available in specific regions then great but there are issues with using VPNs as a means of hiding your identity.
I think this is a bit misleading. There's plenty of good VPNs out there who are known to log nothing and some even share their configs openly so you can see for yourself. In a business where reputation is EVERYTHING there's no reason for an end point to lie about what it logs. It doesn't benefit them to keep logs either.
As for paying them, many allow payment via bitcoin or cash by snail mail etc. Buying a prepaid gift visa also grants relative anonymity when buying a sub.
As for your ISP knowing you're encrypting/tunneling your traffic, so what? The point is this stops them from being able to log what you're doing. They can log packets all they want as long as they can't be resolved to anything (or at least without like, country-level cooperation). When you're using a VPN you're obviously under the same IP as all their other subscribers as well so it's not like any single click can be narrowed down to a single subscriber even if there was some sort of reason to snoop on an individual.
VPNs are a very good way to hide what you're doing. Paired with a correctly configured TOR enabled browser you can make yourself as anonymous as it's possible to be. That combo has defeated governments in the past and presents virtually zero ways to identify a user unless due to user error unrelated to the actual technology being used (like logging into your group's twitter account before turning on your vpn, looking at you Sabu).