Still the person running the bridge can compromise you, at least as much as the people running the VPN. It is safe enough to enter through a VPN before using Tor, although it is probably more likely that a VPN provider keeps logs (even if they say they do not) than it is for your ISP to keep logs of all their users traffic. If you are mostly interested in hiding that you use Tor, that is what bridges and obfsproxy are for. A VPN will hide that you use Tor in that your ISP will see you connecting to an IP address of the VPN node instead of a Tor node IP address, but it will not hide from DPI that you are using Tor because Tor traffic looks very unique. Using a bridge hides that you are connecting to a known Tor node IP address but also does not disguise your traffic, that is what obfsproxy was made for. So far obfsproxy seems to be doing well enough to prevent the censors in China from fingerprinting Tor traffic, I am not familiar with the state of its implementation but currently it is the only way Chinese people can connect to Tor without the censors detecting it and blocking them.