just read the headline about that provider's data exposure. You're in a hotel abroad right now, aren't you. First thing: don't panic and disconnect. That's the worst move. The data tells a different story - most 'incidents' during travel are from using public Wi-Fi w/o the VPN active at all, or from DNS leaks because the app didn't handle the network switch. Here's your immediate action list. One, run a leak test from that hotel room right now, I like ipleak.net. Two, check if your kill switch actually held during your last reconnection. Three, if you're using it for streaming access, your server choice is probably burned for a bit - switch to a less common city server within the same country. The real issue is most providers won't admit an incident happened until weeks later when you're already home and your travel card got flagged. I'm running my own tests on this because my current travel case study needs clean data. Early results show protocols matter way more than jurisdiction when you're physically abroad. WireGuard handles network hops better than OpenVPN on unstable connections, less drops mean less exposure.