Skip to content

Your Browser Doesn't Need a Built-In VPN

February 6, 2026 · 7 min read

Opera has one. Edge has one. Chrome is testing one through Google One. Brave offers one through a paid subscription. The latest trend in browser bloat is built-in VPN services, marketed as essential privacy tools that protect you from prying eyes.

Except they don't. Not really.

Built-in browser VPNs are a case study in how privacy features can be weaponized against the very users they claim to protect. They create a false sense of security, introduce new privacy risks, and serve the browser vendor's business interests far more than yours.

What a VPN Actually Does (and Doesn't Do)

Before we talk about browser VPNs specifically, let's be precise about what a VPN does.

A Virtual Private Network creates an encrypted tunnel between your device and a VPN server. Your internet traffic goes through this tunnel, so your ISP can't see what sites you visit, and the sites you visit see the VPN server's IP address instead of yours.

That's it. A VPN:

  • Hides your traffic from your ISP. Your internet provider sees encrypted data going to the VPN server, not the actual sites you visit.
  • Masks your IP address from websites. Sites see the VPN's IP, not yours.
  • Encrypts traffic on untrusted networks. On public Wi-Fi, a VPN prevents other users on the network from intercepting your data.

A VPN does not:

  • Make you anonymous. The VPN provider sees all your traffic instead of your ISP. You've shifted trust, not eliminated it.
  • Protect you from malware, phishing, or tracking cookies.
  • Prevent browser fingerprinting.
  • Stop the browser itself from collecting your data.

That last point is critical, and it's where browser VPNs fall apart.

The Browser VPN Contradiction

Here's the fundamental problem: when your browser vendor offers you a VPN, they're saying "trust us to protect your traffic from surveillance" while simultaneously being one of the biggest collectors of your browsing data.

Opera's "Free VPN" routes your traffic through Opera's own proxy servers. Opera was acquired by a Chinese consortium (Kunlun Tech and others) in 2016. When you use Opera's VPN, your browsing traffic passes through servers controlled by this entity. Opera's privacy policy permits the collection of usage data, and the "VPN" is technically a proxy, not a true VPN. It only covers browser traffic and doesn't encrypt at the system level.

Microsoft Edge Secure Network provides a VPN through Cloudflare, but it's tied to your Microsoft account. Microsoft knows exactly who is using the VPN and when. The service is limited to a few gigabytes per month, enough to create a habit but not enough to actually rely on. And Edge itself continues to send telemetry and browsing data to Microsoft, VPN or not.

Google One VPN (integrated with Chrome) is offered as a Google One subscriber benefit. It routes your traffic through Google's infrastructure. The same Google that runs the world's largest advertising network and derives the majority of its revenue from tracking user behavior. Google's VPN promises they don't log your traffic, but you're still authenticating with your Google account, and Chrome's own data collection operates independently of the VPN.

Brave VPN requires a paid subscription and is powered by Guardian. While Brave's implementation is more principled than most, it still adds complexity and another trust relationship to an application that should be doing less, not more.

Shifting Trust to the Wrong Place

The core issue with any VPN is trust. You're routing all your traffic through a single point. If you trust that point less than your ISP, you've made things worse.

With a browser VPN, you're trusting the same company that:

  • Builds the software that renders every page you visit
  • Has access to your cookies, history, bookmarks, and saved passwords
  • May have financial incentives tied to advertising or data monetization
  • Controls the update mechanism and can change behavior silently

This is like hiring a security guard from the same company you're trying to protect your valuables from. Even if they're honest today, the structural incentive is wrong.

A standalone VPN provider's entire business depends on their reputation for privacy. If they're caught logging or selling data, their business is over. A browser vendor's VPN is a side feature, a value-add, a way to keep you in the ecosystem. The incentives are fundamentally different.

Browser VPNs Don't Protect You from the Browser

This is the part that browser vendors don't advertise: their VPN doesn't protect you from them.

When you use Chrome with Google's VPN, Chrome still:

  • Sends URLs to Google's Safe Browsing servers
  • Syncs your data to your Google account (if signed in)
  • Reports crash data and usage statistics
  • Runs the Topics API for ad interest categorization

When you use Edge with its Secure Network, Edge still:

  • Sends telemetry to Microsoft
  • Transmits URLs to Bing's API
  • Runs its shopping and rewards features
  • Tracks which sites you visit for "personalization"

The VPN encrypts your traffic from external observers, but the browser is inside the tunnel with you. It sees everything, VPN or not. This makes browser VPNs fundamentally different from system-level VPNs, which sit between all applications and the network.

The "Free" VPN Trap

Free VPN services, whether built into a browser or standalone, have a well-documented problem: if you're not paying, your data is the product.

Opera's free VPN is the clearest example. The service costs money to operate, servers, bandwidth, and maintenance aren't free. Opera isn't a charity. The VPN drives engagement with the browser, and the browser monetizes through data partnerships, advertising integrations, and default search engine deals.

Even paid browser VPNs create a problematic bundling. When the VPN is part of the browser, you can't separate the privacy tool from the data-collecting application. You can't audit the VPN independently. You can't verify that traffic isn't being logged, because it's all happening inside a closed application you don't control.

The Performance and Complexity Cost

Built-in VPNs add overhead:

  • Latency. Every request is routed through an additional server. Page loads get slower.
  • Bandwidth limits. Most free browser VPNs cap your data, creating an inconsistent experience where the VPN randomly stops working mid-session.
  • Connection management. The browser now manages VPN connections alongside everything else, adding complexity and potential failure modes.
  • Battery drain. On laptops and mobile devices, the constant encryption overhead impacts battery life.

And there's the configuration complexity. Is the VPN on? Which sites does it apply to? Does it cover WebRTC? DNS? WebSocket connections? Each browser implements these details differently, and the defaults often leak data in ways that undermine the VPN's purpose.

What You Should Do Instead

If you genuinely need a VPN, here's what works:

  1. Use a standalone, reputable VPN provider. Choose one with a proven no-logs policy, ideally verified by independent audits. Run it at the system level so all your traffic is protected, not just browser traffic.

  2. Use a minimal browser alongside your VPN. A browser that collects nothing (like nav0) combined with a system-level VPN gives you actual privacy. The browser doesn't spy on you, and the VPN hides your traffic from your ISP.

  3. Understand your threat model. Most people don't need a VPN for everyday browsing. HTTPS already encrypts your connection to individual websites. A VPN matters most on untrusted networks, when you need to mask your IP from specific services, or when you want to prevent ISP logging.

  4. Don't confuse a VPN with privacy. A VPN is one tool in a privacy toolkit. It's not a substitute for a browser that doesn't track you, an ad blocker, or sensible browsing habits.

nav0 doesn't include a built-in VPN. This is a deliberate choice.

We don't believe your browser should be your VPN provider. These are separate concerns that should be handled by separate, auditable tools. Bundling them creates conflicts of interest and gives users a false sense of security.

If you want a VPN, use a dedicated one. If you want a private browser, use one that doesn't collect your data in the first place. A browser that gathers zero telemetry and makes zero network requests to its vendor is already more private than any browser-plus-VPN combination from a big tech company.

Privacy isn't a feature you bolt on. It's a design principle you build from the ground up. Get started with nav0.


nav0 is a minimal, privacy-focused browser. No built-in VPN because we don't need to protect you from ourselves. No telemetry. No data collection. Just browsing. Learn more.

Released under the MIT License.