It's serious problem for people who still use website which don't support HTTPS or application which don't perform any encryption between the device and server.
True, but if you're sharing sensitive information with an http website in the first place (which shows their neglect to cybersecurity), then a VPN probably won't help you much. The real problem lies on failing to hide users' identity, which could easily be a life or death situation depending on where they're located. There's an easy workaround from OP's link, thankfully, and I might as well post it here to save other people the trouble:
Internet connections established after you connect to VPN are not affected. But connections that are already running when you connect to VPN may continue outside the VPN tunnel indefinitely. There is no way to guarantee that those connections will be closed at the moment you start a VPN connection.
However, we’ve discovered the following technique to be almost as effective:
Connect to any ProtonVPN server.
Turn on airplane mode. This will kill all Internet connections and temporarily disconnect ProtonVPN.
Turn off airplane mode. ProtonVPN will reconnect, and your other connections should also reconnect inside the VPN tunnel, though we cannot guarantee this 100%.
One more notable workaround to ensure that everything is working well on
all your devices is running the VPN directly on your router, but that obviously won't work when you're out and about.