When the proxy operator is (1) anonymous, (2) the potential target of coercion, and (3) outside the user's jurisdiction, how does a proxy user verify (a) whether the operator collects, or is being forced to collect, data or (b) what it might do, or be forced to do, with colllected data
Perhaps the answer is they don't verify