Chinese-owned VPNs raise concerns

Dozens of popular VPNs on Apple and Google stores have hidden Chinese ownership, raising serious concerns about privacy, trust, and data security.

16-06-2025 - 4 minute read. Posted in: awareness.

Chinese-owned VPNs raise concerns

Virtual Private Networks (VPNs) are often seen as tools for privacy, security, and unrestricted internet access. They promise to protect users from surveillance and help them bypass censorship. However, recent investigations have uncovered that many of the most popular VPN apps on the Apple App Store and Google Play Store are quietly connected to Chinese companies. These links are not disclosed to users, which raises serious concerns about privacy and data protection.

Hidden connections behind trusted apps

A detailed report by the Tech Transparency Project revealed that dozens of VPNs are linked to Chinese developers or investors. Many of these apps have millions of downloads and positive reviews, but they fail to mention their true ownership in their app store descriptions or privacy policies. Developers often register their apps through shell companies or use misleading contact details, making it difficult to trace the actual owners.

The concern lies not just in the origin of the companies but in the legal environment they operate in. Chinese law allows government agencies to request user data from domestic companies. This means that if a VPN is secretly owned by a Chinese entity, user data could potentially be accessed or monitored without the user’s knowledge.

A lack of transparency and accountability

VPN services are built on trust. Users expect transparency, especially when it comes to who owns the app and how data is handled. Unfortunately, many of the VPNs identified in the investigation have gone out of their way to hide their links to China. In some cases, they previously mentioned China in their policies but later removed those references in updates.

Some of the VPNs also make broad claims such as "no logging" while offering unclear or contradictory terms in their privacy documents. This creates confusion and gives users a false sense of security.

Learn more about how VPNs work and what to look for in a trustworthy provider here.

Gaps in app store enforcement

Both Apple and Google have guidelines requiring developers to be transparent about data collection and app ownership. Despite these rules, many of the VPNs with undisclosed Chinese ties remain available for download. The platforms appear to struggle with consistent enforcement, even after facing past criticism over similar issues.

This situation highlights a wider problem with app store moderation. The sheer number of apps and the difficulty of verifying developers' backgrounds make it easy for questionable apps to slip through the cracks.

Potential risks for users

The presence of these apps on trusted platforms puts users at risk. Journalists, activists, and people living under restrictive regimes rely on VPNs for secure communication. Even everyday users who simply want to protect their personal data may unknowingly expose themselves to surveillance or data misuse.

When users download a VPN, they expect protection. Instead, they might be handing over their data to entities they know nothing about.

And if the VPN is free, the real cost might be your privacy. Find out why you should think twice before trusting a free VPN here.

How to stay safe

To avoid risky VPNs, users should take a closer look at the apps they download. Some helpful steps include:

  • Reviewing the VPN provider’s website and privacy policy to see if ownership details and data handling practices are clearly explained

  • Checking for independent security audits or third-party reviews that confirm the service’s claims

  • Being cautious with free or overly cheap VPNs, which often make money by collecting and selling user data

The need for better oversight

The discovery of these hidden ties calls for stronger oversight from app stores. Platforms should take more responsibility for ensuring that apps handling sensitive data meet basic standards of transparency and accountability. Until that happens, users will need to be more cautious and critical when choosing the tools they use to protect their privacy.

Author Sarah Krarup

Sarah Krarup

Sarah studies innovation and entrepreneurship with a deep interest in IT and how cybersecurity impacts businesses and individuals. She has extensive experience in copywriting and is dedicated to making cybersecurity information accessible and engaging for everyone.

View all posts by Sarah Krarup

Similar posts