Tor or VPN? The truth is, it’s not an apples to apples comparison, and since you really care about your privacy and security, I’m going to give you a basic understanding of how each of these tools work and the specific jobs they’re built for.
Be sure to subscribe to the All Things Secured YouTube channel!
There’s one important question you need to ask when deciding whether to use Tor or VPN. It’s quite simple really:
Is your reason for using this kind of privacy technology to keep you from getting in trouble?
If the answer is yes, then Tor is probably your best option. If your answer is no, then a VPN might be recommended here.
And when I say “trouble”, I’m not talking about illegal activity, I’m specifically referring to…
- …dissidents in places like China or Russia fearing political backlash;
- …journalists looking to protect sources;
- …or whistleblowers hoping to protect themselves.
Because as an average internet user, you need to be honest with yourself here: true security and anonymity is impossible unless you abandon the internet altogether.
So everything else is best measured not in binary terms – yes this is private, no this is not private – but rather measured in degrees of strength.
And that’s why a nuanced answer is necessary when comparing Tor vs VPN.
Now I’m going to provide an overview comparison between Tor and VPN, and then offer one more lesser-known solution that combines the strengths of both of these tools into one.
Note: Some of the links in this article may be affiliate links, which means that at no extra cost to you, I may be compensated if you choose to use one of the services listed. I only recommend what I personally have used, and I appreciate your support!
What is TOR? (The Onion Router)
Tor, also known as The Onion Router, takes its name from the way in which it transmits data in layers. It takes your data, including identifiable information such as your IP address, wraps it up in multi-layered encryption and sends it through a network of randomly selected relay servers, each of which only knows their small portion of the journey and not the entire entry to exit transfer.
Let me give you another example to help explain this better.
Imagine that I want to send a top-secret message to my parents without them knowing it was me who sent it. I wrap it up in another envelope addressed to a different friend and don’t put my return address on it.
- Mailman (1st node): When I give this envelope to the mailman, he doesn’t know where the letter will ultimately end up, he just knows to deliver it to my friend.
- Friend Middleman (2nd Node): When my friend receives the envelope, he doesn’t know where it came from since it has no return address, all he knows is that when he opens it up, there are instructions to give it to my parents.
- Parents (Exit Node): When my parents receive the message, all they know is that it came from my friend, but won’t have any information as to the origin of the message. Spoiler alert: unless I sign my name to it.
That is Tor.
This approach provides a lot of anonymity, and is the best option for those who are truly concerned about somebody following their internet traffic.
Weaknesses of Using TOR
But Tor does have weaknesses. Let’s take a look at a few of them.
- Tor is Slow: Using Tor is slow, and that makes sense if you consider all that’s happening with the data when it passes through the Tor network. So if you’re wanting to stream video content online, download large files, or do anything other than basic internet browsing or messaging, Tor is going to be frustrating to use.
- Tor Traffic is Known: Because The Tor Project publishes the full list of exit nodes, there are a lot of online services that either block access to their website for anybody that comes from one of these exit nodes, or they force repeated security challenges such as CAPTCHA and others measures. This means that when using Tor, instead of having freer access to the internet, you may find yourself a bit more restricted.
- Limited Privacy Coverage: For the average internet user, the only way you’re going to access the Tor network is via the Tor browser. This means that any other app or data transfer on your device that doesn’t go through this browser does not receive the privacy benefits of the Tor network. A system-wide or device-wide Tor connection is possible, but it’s not going to be easy to set up for the average person.
- It’s not 100% Private: And finally, as I preach over and over on this YouTube channel, no tool, no tool is 100% secure or 100% private, and there are still ways to pierce the veil of anonymity in Tor. Over the years, various security consultants and researchers have claimed ways to compromise the integrity of the Tor network.
Mind you, unless your communications are high value, it’s unlikely anybody would make the effort to do this. The more likely scenario is that you compromise yourself by sending along identifiable data, almost as if I had signed the letter to my parents. It completely defeats the purpose of me sending an anonymous message in the first place.
Oh, and I forgot one last thing.
Tor is free (which is definitely a bonus).
But this reliance on volunteers is precisely why the network hasn’t grown very fast over the past decade and it brings up legitimate concerns about who owns these nodes and why they’re willing to absorb the cost of running them for free.
What is a Virtual Private Network (VPN)?
Now how does Tor compare with a virtual private network, or VPN?
Well, to start, a VPN wasn’t designed to be a privacy tool. It was initially designed as a way to securely connect to a remote server.
This is often used by companies to allow remote employees or offices to plug into the primary company network, but the idea has since grown to include individuals like you and me who want to either hide our IP address or connect to the internet from a different location.
And that’s really what a VPN does best: hiding your IP address and changing your perceived geolocation.
I mean, there is an additional layer of encryption that happens between you and the VPN server you connect to, but once your internet traffic leaves that VPN server, the encryption is also gone, so take that for what it’s worth.
This is why it bothers me that so much of the VPN industry and many of the influencers and content creators who make money here, tend to promote privacy and security as the primary selling points of a VPN.
As I’ve made clear in another article about why you should stop using a VPN, the truth is that a virtual private network is best used to evade censorship, protect your IP address and or access georestricted content like Disney+, BBC iPlayer and more.
Advantages of VPN over Tor
Unlike Tor, a VPN allows you to easily choose your exit node, which is better when trying to stream this kind of blocked content.
It’s also significantly faster for streaming content and easier to use not just on your browser, but for the entire internet connection on your device.
On one hand, VPN encryption is extremely difficult to break, but on the other hand, as I’ve talked about before on this channel, using a commercial VPN is simply a shift of your trust away from your internet service provider and into the hands of the VPN company.
Most of these VPN companies seek to earn that trust through independent audits and no logs claims, but the truth is that the promise is just that, a promise. And there’s always a risk it could be broken.
I’m comparing the two side by side here, but as I said at the very beginning, this really isn’t an apples to apples comparison. We’re comparing a decentralized privacy tool, Tor, with a centralized secure access tool, or VPN.
If your data presents a danger to you, Tor is probably your best option. For everything else, a VPN probably does everything you need.
Alternatives to Tor and VPN for Privacy
But hold on!
These tools have been combined in two different ways to build on the strengths of each and minimize their weaknesses. Let’s take a quick look at some alternatives to Tor and VPN.
Tor / Onion Over VPN
First, there’s what’s known as Tor over VPN, also called “Onion over VPN”, where you’re basically connecting to a VPN first and then accessing the Tor network from there.
It hides the fact that you’re using Tor and prevents any of the Tor nodes from seeing your home IP address, if for some reason that matters to you.
This is a popular option that is often native to some VPN software. You’ll find advanced connections that give you the option to route your VPN connection through the Tor network.
dVPN = Decentralized Virtual Private Network
The other option that I like more is a decentralized VPN, or dVPN for short.
This is a fascinating new technology that combines the speed and control of a VPN with the privacy and decentralization of Tor.
It’s also run by a network of volunteer nodes, but since they get paid for the bandwidth they provide using crypto, there’s an understandable incentive for the growth of the network.
I use a service like Mysterium to access the network and while it’s still a technology in its infancy, it has performed well for me.
I’m not here to declare a winner between Tor vs VPN or to tell you that you need to use one over the other. What I hope is that you now have a basic understanding of how they work and what they are best used for.