First of all, VPN design goal was not to provide anonymity and privacy but to enable communication for scattered︀ resources in virtual LAN through single gateway - remote offices, printers, projectors etc. Confidentiality thru︁ encryption was not a part of that design.
For VPN to operate, it needs to︂ know your source and destination URI.
Today's commercial VPN services are functioning as overlay network︃ that masquerades your source address with its gateways's so that your destination is deceived.
To define logging we need to agree what data are being stored. Recording and storing traffic︄ requires storage resources. It's highly not likely that VPN providers are performing that kind of︅ universal and non discriminatory storing. Focused ones, perhaps, particularly when requested by public authorities. But,︆ storing source and destination address with associated data, whether they state a no logs policy︇ or not, they simply, by a nature of the system, have the access to those︈ data.
Networking is all about hops. In order to locate you an adversary needs to︉ execute traceroute. Hops are there to protect your location.
There comes a TOR and I2P︊ as mixer networks with several hops.
I already wrote about that
Post in thread 'Is︋ TOR Still Anonymous? and How Were People Caught Using TOR?'
Is TOR Still Anonymous? and︌ How Were People Caught Using TOR?
No, it's not complicated to achieve network privacy, anonymity︍ and security across full spectrum. But, yes, there are no readily available solutions for OP's︎ idea whatever the marketing. We may offer a solution - both hardware and software -️ to that in time to come.