Are the Mozilla services that are excluded from the VPN encrypted or otherwise protected for secure identity?
You say, "Some essential Mozilla services are excluded from VPN routing to ensure sign-in, VPN reconnection, and screens needed to sign in for public Wi-Fi work properly. All other browsing activity in Firefox remains protected when the VPN is on."
How then am I protected in any kind of secure way?
All it would take is the Mozilla services using my public IP to lose my browsing protection. How are those connections secured to protect my identity from being exposed once the VPN is enabled and even after the VPN is enabled?
If the public IP can be discovered at sign-in, re-connections, and public Wi-Fi connections before the VPN is enabled, then that same public IP can be traced through internal logs to uncover all the VPN activity done after sign-in, re-connections, and public Wi-Fi access. So, how exactly can I trust the VPN protects my activity at all?
I'm just curious how you setup any protection prior to the VPN being enabled? I'm a former IT Network Specialist I had my CISCO CCNA certificate (Worked in school districts who wouldn't pay for additional certificates so I did all the study work and practice testing up to the CCNP certification just could never afford to take any of the exams beyond the CCNA). So, when I see these additional things like your 50 GB of free browser VPN and read how it works I get curious about the actual protections being provided. Are the people more vulnerable than they may be led to believe?