>>2291I know what differences between Tor and generic VPN protocols are, between Tor infrastructure and infrastructure of your average "we do not keep logs" VPN provider. Linking decade old articles won't help newbies to understand the topic though. In fact it doesn't matter which Tor node knows what if three of them happen to be in France and France happens to have country-wide data logging and retention law, comprende, innit?
>>2292None of those. I'd put it in hands of 3 shmucks who did apt-get install tor on their VPS and forgot about it. VPN should not be neither a service, nor it should be provided by third party rather than your company, your friend or yourself. However, VPNGate is comprised of volunteers from different countries, mostly Asian, but instead they use a SoftEther server. Similar to Tor node admins. It is not anonymous to the degree as Tor is, nor secure is. Therefore most people use it as circumvention tool, as most VPNs in fact are, just read their TOS closely. In fact I am 100% sure none of them will be interested in selling my hentai or chan preferences to advertisers, contrary to big so-called VPN """providers""" (what a stupid name, americans always come up with dumb terms tbh) who have access to thousands of user's data simultaneously. VPNGate is also a nice way of hiding your Tor exits from some half-assed websites that decided to block Tor connections for some reason.
>unencrypted webpage viewsThat's mostly old obscure pages from web 1.0 era, I am completely fine with it. Everything that has a login page today has https, but if a public page has https, it won't save you from snooping. You know, there is this thing called "Website fingerprinting attack" When you visit a website, even over VPN, SSH tunnel, or https every page has unique download patterns. The technique is pretty accurate around 90%, an adversary can detect what pages on "encrypted" site you visit. So, in order to at least hide what websites you visit from your ISP even when using VPN, you'll need a custom VPS with obfuscated shadowsocks rather than plain OpenVPN on someone else's computer.