From what I gather in your post, your [threat model](https://en.wikipedia.org/wiki/Threat_model
) essentially rests on you trying to avoid detection from your ISP and subsequently copyright holders.
A threat model is important to consider. If one is trying to achieve full anonymity and confidentiality from the likes of the NSA, then a VPN alone is not enough.
I would highly recommend a VPN in your case, however. I won't go into specifics as to which provider, but a quick search of this sub can reveal quite a few providers who are up to scratch.
There is of course a level of trust you have to place in the VPN provider itself that it is adhering to it's claim of "no logs". There have been a few high profile cases where VPN providers tracked users after claiming no logs were being kept. In my case however, I have not experienced any issues with my provider logging me (that I am aware of) and/or forwarding along DMCA complaints to me (for what it's worth).
Many of these no log VPN providers that allow P2P would merely ask you to avoid using servers in specific locations (E.g. USA) so as to avoid any problems with their data center providers in that respective country.
Above all, a very easy mistake to make when utilizing a VPN for P2P purposes is not ensuring that DNS leaks are neutralized. Without going into a great level of detail, you can achieve this with many of the VPN providers' proprietary software where it is a mere check box that needs to be checked. Usually you will see a setting that makes note of "Stop DNS Leaks" or something along those lines. An easy way to check if your DNS leaks have stopped is to go to [DNS Leak Test](https://dnsleaktest.com/
) and run it through an extended test. You should see only the DNS settings of your VPN provider here if it is configured correctly.
I am by no means an expert on VPNs, but I hope this helps steer you in the right direction.