Hundreds of free VPN apps are not fit for purpose – but sadly, we can’t tell you which are the naughty ones

  • Many free VPNs act like spyware, collecting sensitive user information
  • Several apps misuse permissions, turning privacy tools into tracking systems
  • VPN developers often justify excessive access with misleading security explanations

The growing popularity of free VPN apps has provided mobile users with an easy path to privacy – however, new evidence also suggests many of these apps may be doing the opposite of what they promise.

Research from Zimperium zLabs has claimed a large portion of free VPNs for Android and iOS request excessive permissions, use outdated code, and may expose users to surveillance-level risks.

Despite the scale of the findings, the report did not disclose which apps were involved, leaving users to rely on their own caution when choosing what they believe to be the best free VPN service.

When privacy tools become surveillance risks

A VPN app is supposed to encrypt and protect network traffic, but many of those analyzed show behaviors that contradict this purpose.

Some request Android’s “READ_LOGS” permission, which allows them to view system-wide activity, potentially giving them access to usernames, passwords, and personal messages.

This ability effectively turns them into spyware, capable of keylogging and avoiding mobile threat detection.

Others seek iOS permissions such as “LOCATION_ALWAYS,” granting 24-hour GPS tracking that enables continuous surveillance of a user’s movements.

These permissions, which have no legitimate use in a VPN, can be combined with traffic data to create detailed profiles of a person’s online and offline habits.

Zimperium’s analysis found many cases where free VPN apps requested “private entitlements,” which allow deep access to a device’s operating system.

Such privileges can let an app run code, extract sensitive data, or gain control over the device, creating serious privacy and security risks.

Some apps also use outdated OpenSSL libraries still vulnerable to the Heartbleed bug from 2014, showing that many developers are neglecting even basic patching standards.

Others fail to validate certificates properly, exposing users to man-in-the-middle attacks that allow interception of supposedly secure traffic.

Researchers also found VPN apps requesting permissions like “USE_LOCAL_NETWORK.”

This allows them to map nearby devices on a Wi-Fi network, a function better suited to malware than security software.

Developers sometimes justify such access by claiming it improves “connection troubleshooting,” yet in practice, it allows device scanning and network reconnaissance.

Several apps can even capture screenshots, exposing user data that is visible on the screen.

With hundreds of VPNs found to present such risks, the difference between secure and unsafe tools becomes critical.

Unfortunately, Zimperium declined to share the list of these VPNs, therefore, users must approach free VPNs with skepticism.

Also, they should favor providers that undergo independent audits, clearly disclose their privacy policies, and avoid intrusive permissions.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

You might also like

Read more @ TechRadar

Latest posts

After one and a half playthroughs, Tales of Xillia Remastered has proven that this old RPG was worthy of an upgrade

The Tales series has been going strong for almost 30 years. From the humble Tales of Phantasia to the recent Tales of Arise, the...

I was sick of Apple Watch Live Activities until I found this simple fix

The Apple Watch is all about quick, glanceable information – your split time on your morning jog, message alerts when your friends get in...

This cordless upright vacuum blends power and portability – it’s perfect for small homes

Shark Freestyle Max: two-minute reviewProduct infoThis model has slightly different names and product codes in different territories:US: Freestyle Max SV2002UK: Freestyle Pro / Freestyle...

Ghost click farms: the invisible threat draining enterprise ad budgets

Hundreds of fake apps and millions of downloads contributing to billions in ad fraud – welcome to the brave new world of ghost click...

I tested the KTC H27P3 and this 27in 5K monitor is exceptional value and offers a dual-mode display to optimise the screen for work...

KTC H27P3 27in monitor: 30-second reviewThe KTC 27in 5K IPS (H27P3) is a stylish 5K monitor with dual display mode that enables you to...

ICYMI: the week’s 7 biggest tech stories from IKEA’s 21 new smart home gadgets to our Samsung Galaxy XR review

This week, Black Friday month officially kicked off, and we reviewed the brand new Samsung Galaxy XR headset.To catch up on both of these...

Why Sonos can’t afford to lose the Music Intelligence race

Sonos’ software has historically been one of its biggest differentiators…but Amazon is leading a wave of improved AI in music appsSonos knows change is...

“It’s incredible to revisit this after almost a decade” – step inside Zootopia 2 early with Disney’s new 4D attraction

Walt Disney Animation Studios’ next feature film is swiftly approaching, or should we say hopping toward, its theatrical release date. Nearly a decade after...

You can now interrupt ChatGPT as it learns to take feedback on the fly

OpenAI has added a new feature to ChatGPT that lets users interrupt the AI mid-responseUsers can write context or corrections to a prompt without...

Perplexity upgrades Comet to multitask across your tabs

Perplexity has updated its Comet Assistant AI to multitask across browser tabsComet can also complete more difficult and complex quests with multiple stepsThe AI...