I am saying it is not possible to use the data to invade your privacy. You are saying it is unnecessary. Most, if not all of this data is also collected by theymos on this forum. Most of this information is sent to the website you are visiting by default.
They want you to create an account with your real name and full address. How is that not invading your privacy? It is unnecessary for a VPN to collect that information en masse from every customer, since a good VPN will accept anonymous crypto payments.
And if you look at the other information I quoted in the linked post:
"data relating to the browser you are using, mobile/desktop device, general properties and metadata, OS version, preferred language, the date and time of your visit, battery charge, screen resolution, Google Advertising ID, Gyro-sensor data, screen size, Connectivity (WLAN), Mobile service provider"
It is absolutely possible to invade your privacy using all that. And no, most websites do not collect all the information because my set up prevents them from doing so. Far harder to do that for a piece of software you install on your device than from a website.
If you trust this shady company enough to install their software on your system, then go right ahead, but when there are dozens of far better VPN providers out there then there is absolutely no reason for anyone to use any VPN owned by Kape. You couldn't pay me to install this privacy invading nonsense.
I think there is a very real risk that you will have your money stolen.
I've literally never been scammed once.
Bisq allows for many reversible payment methods that can be potentially reversed long after the fact.
Bisq specifically do not accept payment methods which are easily reversible:
The top consideration for maintaining payment methods is chargeback risk. PayPal, Venmo, and Cash App are not supported on Bisq because chargebacks for payments made with those services are relatively easy.
I feel far safer trading on Bisq than I do risking all my coins and risking my identity being stolen by using a centralized exchange. The list of centralized exchange hacks (for either coins or data) is endless.