Threat Model — who we are for
An honest guide to what we protect against, and what we do not. Last updated: April 16, 2026.
The short version
UnblockMeVPN is a consumer privacy VPN. We are built for everyday people who want their internet activity private from their ISP, their Wi-Fi hotspot, advertising networks, and data brokers.
We are not a specialist tool for life-or-death anonymity against a sophisticated, targeted adversary. If that is your situation, this page recommends better tools at the bottom. We would rather you be properly protected than oversold on us.
What UnblockMeVPN protects you from
- Your ISP seeing what sites you visit. Every DNS query and destination IP is wrapped inside an encrypted tunnel to our servers. Your ISP sees only that you are connected to UnblockMeVPN.
- Public Wi-Fi snooping. On hotel, cafe, airport, and conference networks, anyone on the same access point can otherwise see unencrypted traffic and conduct simple man-in-the-middle attacks. The VPN tunnel prevents this.
- Advertising networks and trackers tying your activity to your home IP. Your real IP is replaced with the IP of the VPN server, shared among many users.
- Data brokers building a profile from your IP history. The same mechanism breaks long-term per-IP tracking.
- Travel and public-network privacy. Hotel, airport, cafe, and conference networks are much safer when your connection is encrypted end to end.
- General location flexibility. Choosing a nearby or preferred region can improve speed, reliability, or service compatibility depending on your use case.
What UnblockMeVPN does not protect you from
- Malware or compromise of your own device. If your laptop or phone is infected, a VPN will not help. Keep the OS updated and do not install software from untrusted sources.
- Phishing and social engineering. If you hand over your credentials, no tunnel can save you.
- Logging in to your real accounts. The moment you sign into a Google or Facebook account, that service knows exactly who you are — VPN or not.
- Browser fingerprinting. Advanced trackers can identify your browser by its configuration, fonts, and canvas rendering. Use Firefox with uBlock Origin, or Brave, for stronger defaults. Tor Browser is the gold standard here.
- Targeted surveillance by a nation-state intelligence service. If you are personally important enough for a government to spend real resources against you, a commercial VPN is not sufficient. See the "higher threat" section below.
- Legal consequences of what you do. A VPN hides the how from your ISP, not the what from the sites you use. If you commit a crime and the destination service cooperates with law enforcement, the VPN is not a shield.
- Your own mistakes. Sending an email from your real account, posting an identifying photo, paying for something with a card in your real name — the VPN does not undo any of this.
How we keep our promises technical, not aspirational
Every privacy claim we make is backed by a corresponding technical choice, not a marketing statement:
- Encryption: OpenVPN with ECDSA certificates and TLS-Crypt-v2 — modern cryptography backed by the stack we ship publicly.
- No traffic inspection: our servers forward packets. They do not inspect, mirror, or record the payload.
- Minimum data retention: see our Privacy Policy and Law Enforcement page for the complete list of account-level records we keep. There are no connection logs, no bandwidth logs, no DNS logs.
- US jurisdiction, disclosed: POD RV LLC is a Hawaii company, subject to US legal process. Our defense is that we retain almost nothing to hand over, not that we are located somewhere the law cannot reach.
If your threat model is higher than ours
We want to be straight with you: if you are a target for a capable adversary — a sophisticated criminal organization, an intelligence agency, a corporate espionage operation — a consumer VPN is one layer of a much larger stack, not a complete solution. The right stack looks something like this:
- Use Tor Browser. It was designed for exactly this threat model.
- Run a hardened operating system. Tails boots from a USB stick, routes everything through Tor, and leaves no trace on the host machine. Qubes OS is a strong alternative for daily use.
- Pair Tor with an audited VPN in a privacy-friendly jurisdiction. Services such as Mullvad or IVPN are repeatedly third-party audited and offer account-number-only signup with cash payment options.
- Use a dedicated device. Do not do anonymous work from the same hardware you use for your banking and social media accounts.
- Get professional help. Organizations such as Freedom of the Press Foundation, Access Now Digital Security Helpline, and the Electronic Frontier Foundation provide free guidance to people in high-risk situations.
How to decide if we are right for you
Answer these questions honestly:
- Do you want to keep your browsing private from your ISP, your employer's network, your landlord's Wi-Fi, or an advertising company? Yes — we are a good fit.
- Do you travel often and want more privacy on hotel, airport, or cafe Wi-Fi? Yes — we are a good fit.
- Are you on public Wi-Fi regularly and want to stop trivial snooping? Yes — we are a good fit.
- Are you specifically being investigated or surveilled by a government, a large corporation, or an organized threat? Consider the higher-threat stack above in addition to, or instead of, a consumer VPN.
- Are you intending to use a VPN to commit fraud, harass someone, distribute abuse material, or launch attacks? No — please stop. These uses violate our Terms of Service, and they harm the people who depend on privacy tools for legitimate reasons.
Questions
We publish our Privacy Policy, Terms of Service, and Law Enforcement policy in full. If something here is unclear, email support@unblockmevpn.com and we will answer in plain language.