VPNs in my opinion are too big a target for not being very attractive for subversion by certain agencies. That said they're probably safe enough to protect you from random greedy copyright lawyers and crazy forum admins. I'm not entirely sure they're good enough when a place you were active in gets seized complete with logs just because somebody read a bit too much 8chan and went on a spree, or caves in when it gets some low level police inquiry as null has gotten in the past, and my imagination is it depends how much public interest/pressure is on them in such cases. People say this never happened as the truth would come out that a VPN logs and supplies data but when uniformed people show up at your house at 4 AM, take all your electronics and scare and imply to you that you're "in hot water now" and better shut up, you're not gonna talk about it. Most people wouldn't. In many countries "gagging" people to talk about such things is also a perfectly legal tool.
What I'm generally mostly worried about with them is subversion for passive data collection, and I just don't really trust them there personally. That data they collect for god knows whom might not even be valuable now, but with shifts in laws in some countries and technology in general (to sort through it) it might become valuable later. These agencies have a very long breath and love doing shit like collecting stuff for twenty years "just in case". Look it up if you don't trust me on that, even "just" law enforcement loves such strategies. I wouldn't even be surprised if this very post ends up in some agency archive. Not because it's of special interest, just because it was passively crawled with everything else.
What also gives me pause with VPNs is how utterly aggressive some of them are marketed and advertised, even with huge, often unlimited rebates when you do as much as just sign up.
I'd go with Tor for general browsing, the decentralized "no single place knows all, nobody's in charge" nature of it speaks to me more from a security standpoint. I also like how most places lock out tor exit nodes by default, it's a bit of a seal of quality regarding how anonymous it probably is. (barely any of the big players do this for VPNs, strange if they're "just as anonymous&safe" IMHO) Tor has gotten noticeably faster in recent years and places that do blanket bans on exit nodes are often not worth visiting to begin with. Normal stuff (e.g. shopping on eBay, online banking) I personally do without anything as that's tied to my identity anyways. ( = it makes no sense to hide my IP from e.g. Amazon when I do christmas shopping with my account. They know my address. It might even make me less anonymous as they might correlate that data with other browsing I do)
All this also won't help you if you have poor opsec or limited understanding how this stuff works. I for example push my tor browser instance in a network namespace in linux in a way where it can only communicate with the outside world via tor and can't even see my network interace(s)/local network, even if I wanted it to. If you don't get any of that and just want to push a button that makes you anonymous, you might be in an inferior position to begin with. This is not meant in an insulting or arrogant way (I hold privacy very dear and it should be available to everybody) but the truth is if you can't identify risks and plan your own opsec, you might have a problem. Even the kiwileaks have shown that people that found their way here are not good about anonymity and there was enough data in that leak to dox some of them. No fancy vpn/browser/technology is going to protect you if you can't do it by yourself.