Shouldn't the Startpage of HN be filled with Promotion and Comparision Blogposts?
DIY: Do you know any you would recommend?
If you use a VPN service, don't be surprised if the local equivalent of the NSA has a sniffer on the termination point. Lots of them do this with Tor, because lots of them use Tor.
Your best hope as far as VPNs are concerned is to run your own, or an SSH-based SOCKS proxy. The best thing to do is for sites to use SSL for anything sensitive.
And (imho) if this is your corebusiness you should be better good in making sure there are no sniffers at your exit points.
Regarding "own server" - to me this is similar to "own email server". The amount of people who don't have servers that are more secure than professionally hosted ones is big enough as a market.
Likewise, if the endpoint is being used for malicious activity targeted against the critical national infrastructure of country foo, the provider is not necessarily going to have the option to become aware of the interception of their exit traffic.
With your own server it may or may not be more secure, and may or may not be intercepted at the endpoint, but providing you can reasonably configure it the only person that would attract state-level interception (over and above other local connections) would be you.
I am not "scared" of people who are able to do "state-level interception".
People on the Airport or in Coffee Places with Firesheep annoy me.
Bandwidth, cpu, etc... is all but free. your big costs would be handling the abuse desk.
Now, depending on how efficiently you handle the abuse desk, your margins could be pretty good.
On the other hand, your fee per user would have to be pretty low. The people who live in countries with restrictive firewalls tend to be /really/ cheap. but, if you can keep your abuse costs down, the cost of servicing a particular user is almost zero.
I would like to take control that's the reason i am so bullish on this.
there are all sorts of choke points between your vpn provider's output and your destination server where unencrypted packets can be read, and many of them are not guarded well. BGP even is not particularly secure. You should treat an unencrypted packet as less secure than a post card.