All the VPNs mentioned here, free or not free, nothing but load of crap!
Fine if and when they do work.
BUT
There are times when the VPN crashed and not working.
When you realised that, it will be already too fucking late.
Or you might not even realised that they not working.
The safest will be via TOR.
And which thread whatever the fuck you writing and relaying that through 2 or 3 VPNs
TOR open up window strictly in TOR. And if TOR stop working for any reason, that window will automatically shut down AND PREVENT YOUR WRITING ANY FUCK THING IN THE CLEAR.
Educate yourself and make yourself safe safe.
https://www.torproject.org/
https://2019.www.torproject.org/about/overview.html.en
BRIEF EXTRACT
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.
Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.
Staying anonymous
Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use
Tor Browser while browsing the web to withhold some information about your computer's configuration.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.