Risks associated with exposing custom VPN IP or home IP address

Given a threat model covering passive attacks and general surveillance capitalism (including ISP snooping), I’ve been thinking through the risks associated with exposing an ISP IP that I connect to via VPN.

I have a home lab server hosting a variety of self hosted services I use. I have an always-on connection to this server IP over VPN from my mobile phone. I use this for notifications, location tracking, etc, so it’s important to me that it’s always on. All my internet traffic is also routed through this server and exits through a public VPN provider. I’m wondering how concerned I should be by the fact that I’m the only one connecting to this IP and therefore very identifiable on public wifi. I’m thinking:

  1. Anytime I connect to public wifi, I could be profiled because my traffic pattern is so consistent and I’m the only one that ever connects to that IP. (in general, I have traditionally favored wifi connectivity for my mobile phones and often run in airplane mode)

  2. My home ISP will see my source IP when I’m traveling and can derive my location from this IP anytime I’m connected to wifi outside my house.

I believe I can solve this on my laptop by tunneling my home VPN through a public VPN service but my understanding is that tunneling VPNs is not possible on Android/GrapheneOS.

Is this a threat vector I should be worried about for general anti-surveillance capitalism?How comfortable are you exposing your dedicated VPN IPs to all of the public wifi points you connect to?