>>524523
TOR is pretty decent nowadays. Fast enough to play videos. I've been using it for years for /brit/, even despite our last home lumping most torposters into the 000000 id and tarring us with the same brush as spammers, leading to half you cunts treating me as a darkie for months while still unknowingly reposting my low-effort OC.
For getting around local regional restrictions it's ok, but configuring it to use exit nodes in a particular region is a giant pain in the arse requiring looking them up and putting them in a text config file (torrc) before launching.
For anonymity it's dubious, as despite le behind 3 proxies mene, an unknown number are alleged to be run by governments trying to get enough control of the network to identify who is sending data where, as opposed to volunteers. Other than growth in volunteer nodes and the pass-the-parcel idea of your data having potentially 4 layers of encryption on it including TLS between you and the chan server (7 if you use a hidden service, which is still slow), I don't quite know how that threat is countered, if it even can be.
Do you trust shekelberg's VPN to not log or share your data with five eyes while under government pressure to do so? Me either. I trust neither, but one is free, huge and community maintained, and the more people use it the safer it is, so it's a pretty easy sell.
The only VPN you can fully trust is one that you physically install in a university campus yourself and successfully defend from tampering.