FWIW, I do not believe that either Sentinel nor Mysterium (though I don't bother looking at their product often; I am very confident about this for Sentinel, though) currently have any support for "multiple hops" through VPNs, and so for the complaints people are talking about here I would consider them "somewhat actively dangerous".
(To be fair, Orchid has for some reason decided to hide multiple hops behind an advanced settings panel currently; I feel like this must have been some kind of miscommunication internally, and I annoyingly-to-me don't directly do the development on the front-end app; but it is supported, if slow.)
Like, if you want to, right now, you can run a Sentinel node... and then you just get to "be the spy" and collect all of the information about the users who select your node. They claim this isn't possible, but that makes no sense and I can tell you from first-hand experience that it is... they seriously seem to think that because their code is distributed using a docker container that no one can either edit its behavior or add logging around it? It is really awkward, actually :(.
And, worse, part of the goal of these "decentralized VPN" projects is to let you not care so much about which node you are using... which means that, over time, you are likely to eventually use an attacker as your exit node (which is actually somewhat intrinsically "dangerous" anyway, even with multiple hops, as, if you allow any non-authenticated--in the cryptographic sense of that term--traffic to go through your tunnel, as even with multiple hops the final node can edit the traffic).
(I am very curious, BTW, what your specific use case is with split tunneling that isn't being supported currently by Mysterium.)
The machine I tend to use for connecting runs headless and a recent change in Mysterium has made it so that once I connect to their network I'm disconnected from that machine on the local network. Not sure if it's a feature of split tunneling that normally allows this behaviour. I might have my terminology wrong.
Ah ha! Ok, I wouldn't have called that split tunneling myself (but maybe I should have: I am totally willing to believe that I should). (That sane issue happens with Orchid's tooling by default--on a desktop it is somewhat easy to fix with another manual route, which you can probably also use with Mysterium, but on mobile as a user you don't have many options. I was actually going to be fixing that for our next update because one of our key people told me they don't run it on their phone because of this; in his case, it disconnects his phone from his baby monitor.)
I gave the manual route a go with Mysterium but it didn't help. Thanks for the tip anyway. I'll wait until they've fixed the issue. I'd try out Orchid but I can't see a Windows client.
(To be fair, Orchid has for some reason decided to hide multiple hops behind an advanced settings panel currently; I feel like this must have been some kind of miscommunication internally, and I annoyingly-to-me don't directly do the development on the front-end app; but it is supported, if slow.)
Like, if you want to, right now, you can run a Sentinel node... and then you just get to "be the spy" and collect all of the information about the users who select your node. They claim this isn't possible, but that makes no sense and I can tell you from first-hand experience that it is... they seriously seem to think that because their code is distributed using a docker container that no one can either edit its behavior or add logging around it? It is really awkward, actually :(.
And, worse, part of the goal of these "decentralized VPN" projects is to let you not care so much about which node you are using... which means that, over time, you are likely to eventually use an attacker as your exit node (which is actually somewhat intrinsically "dangerous" anyway, even with multiple hops, as, if you allow any non-authenticated--in the cryptographic sense of that term--traffic to go through your tunnel, as even with multiple hops the final node can edit the traffic).
(I am very curious, BTW, what your specific use case is with split tunneling that isn't being supported currently by Mysterium.)