Tor vs. VPN – A 2020 Comparison

The Tor browser and VPN services are two leading privacy tools which have their own unique strengths and weaknesses. We review both tools and show you how to combine them for increased security and anonymity online. Learn the pros and cons of Tor and VPN for privacy and security. Should you use both? Or just one? Our complete step-by-step guide explains.

When it comes to protecting your privacy online, VPNs are the most commonly-used weapon. According to an August 27, 2018 report by GO-Globe.com nearly 25% of Internet users had used a VPN at least once in the preceding 30 days. Given Statista.com’s count of almost 4 billion Internet users in 2018, we’re talking about over 400 million people using VPNs.

In 2020, more people than ever are using the internet, and with the nasty COVID-19 forcing many to work from home, a VPN is an important tool in your privacy-protection arsenal.

But VPNs aren’t the only weapon regular people are using in this fight. Tor, the anonymity network originally developed by the United States Naval Research Lab, has a big audience too. Exact numbers are difficult to come by (it is an anonymous network after all), but the Tor Project’s Tor Metrics page consistently shows around 2 million users per day.

So this begs the question: Which is better for what purpose? & Can you use them together? In this article we will attempt to answer both of these questions.

Tor vs VPN
Here’s our complete guide on how to use a VPN with Tor Browser

Not A Simple Tor vs VPN Comparison

Tor and VPNs have complementary strengths and weaknesses. Privacy advocates have long considered and disagreed about, the benefits of using Tor and a VPN together.

However, Tor and VPNs are fundamentally different technologies, and while both of these privacy preserving technologies obfuscate your location and identity, they have specific pros and cons that may effect or enhance your browsing experience.

In this article, we’ll take a quick look at how Tor and VPNs work. We’ll also take a quick look at the controversy over using the two together and exactly how that should be done. And we’ll wrap it up with a guide to installing and using our recommended configuration.

Expert Take
    1. Step 1: Get a recommended VPN:
    1. Step 2: Launch your VPN
    2. Step 3: Download and install Tor Browser:
  1. Step 4: Run Tor over VPN for ultimate privacy

What is Tor?

Tor, which stands for “The Onion Router,” is a free and open source network designed to provide anonymity for its users. Data passes between your computer and the Internet through a series of thousands of volunteer-run Relays (servers) that hide the user’s identity and location from anyone monitoring Internet traffic.

Tor protects its user’s privacy, but some websites block connections from any Relays known to be part of the Tor network.

Tor is an open source project, although it was originally publicly funded through grants by the US federal government. This was ultimately because Tor was used for military applications such as secure communications.

Governments and other global adversaries may be able to monitor the known entrances (Guard Relays) and exits (Exit Relays) of the Tor network to attempt to de-anonymize users.

In countries like China, Egypt etc this may open you up to problems if you try to use TOR.

What is a VPN?

A VPN (Virtual Private Network) is a service that provides an encrypted connection from your computer to servers in the VPN network. The VPN server then connects to the target website and relays data between your computer and the target. As far as the target site can tell, it is communicating with the VPN server and not with your computer.

Because many VPNs have servers located in dozens of countries throughout the world, you can use a VPN to appear to be located in another country, and access sites that are not available in your actual location. Thus if your in a country like China you can access news sites which are blocked locally. Or if you were in the United States you could access crypto exchanges and online casinos which block US access.

Similar to Tor, there are sites & countries that block VPN access. In China for example, many well known VPN providers get blocked. However there are always ways to still use a VPN if you try enough VPN providers and servers. Really good companies like NordVPN and ExpressVPN will always stay ahead of the curve and make sure they have servers that work from China.

Understanding the Different Strengths and Weaknesses of Tor and VPNs

While both Tor and VPNs help to protect your privacy online, the differences in the way they function give them different strengths and weaknesses. Understanding these differences will help when we get to the discussion of whether and how to use Tor over a VPN.

Let’s start by looking at Tor’s strengths and weaknesses.

Tor’s Strengths and Weaknesses

Tor is good at providing anonymity without the need to trust anyone. No Relay in the network knows the complete path between your computer and the target website. This prevents individual Relays in the network from breaking your anonymity.

The biggest privacy weakness of Tor is that it is possible to monitor your computer and try to correlate the timing of traffic between your computer and Exit Relays. Statistical analysis could then possibly identify you.

Tor Strengths and Weaknesses

Another weakness is that most Exit Relays are at known IP addresses. This allows websites to block access from those addresses.

A different kind of Tor weakness is that your ISP can see that you are using Tor. Governments and intelligence services likely consider the use of Tor to be suspicious.

Finally, because Tor requires multiple levels of encryption, and hops between at least three computers scattered around the world, it is slow. That is, browsing using Tor is much slower than connecting directly to the target website.

Many users opt to use Tor over The Amnesic Incognito Live System, or ‘Tails’, which is a privacy based operating system focused on privacy and anonymity. An open-source OS, Tails has received a good deal of financial support from the Tor Project, and has been running since 2009.

If you are a user that’s particularly concerned about privacy, you should consider connecting to the internet through a Tor relay and VPN while using the Tails OS.

VPN’s Strengths and Weaknesses

VPNs are good at protecting your privacy without having a major impact on your browsing speed. The best VPN’s use military-grade encryption while only reducing your browsing speed by 10% or less. They also incorporate a kill switch or other techniques to ensure that your data is not exposed if the VPN connection fails for some reason.

When you use a VPN, your ISP and anyone else snooping on your connection can see that you are connected to the VPN. But they can’t see the data passing through the VPN or what you are connected to. So you are safe from everyone, except your VPN provider.

VPN Strengths and Weaknesses

The biggest weakness with a VPN is that the VPN provider can see where you go and what you do online. After all, it is their software that encrypts your connection and routes it to the destination. While a VPN can see this information if they wish, a good VPN will normally keep track of as little of this information as possible.

Exactly what information a VPN needs to log and how long it needs to keep it to function properly is an open question. But the best privacy-oriented VPNs will log as little information as possible for as short a time as practical.

Computer protected by VPN

In particular, they will keep no connection logs. Connection logs don’t include information on which sites you visit, but they still contain enough information that they can be used to identify you.

But any VPN has the potential to record this information and can be forced to do so by the authorities in the country where the VPN service is physically located.

As someone once put it, “no VPN provider is going to go to prison to protect a $20/month subscriber.” And that is why we always recommend VPN providers with zero logging policies, Nordvpn and Expressvpn are our top choices.

You can minimize this risk but not eliminate it. VPNs are based in many different countries around the world. Using a VPN that is based in a country with strong privacy protections can reduce the risk that a VPN would be required to turn over logs with your data.

Why Would You Use Tor and a VPN Together?

As we just discussed, Tor and VPNs both have their own strengths and weaknesses. It seems that using them together might be a way to leverage their strengths and minimize their weaknesses. Even so, some influential privacy experts have argued against doing so.

We think it does make sense to use Tor and a VPN together, but it makes sense to spend a few minutes looking at the arguments for and against doing so. Then you can decide if you agree with our proposed solution or not.

Arguments against Using Tor Browser and a VPN Together

One big argument against using Tor browser and a VPN together is that it slows you down. Browsing with a good VPN will likely be around 10% slower than not using a VPN. Browsing with Tor will be significantly slower than not using Tor. A VPN together with Tor will be slower yet.

The other drawbacks vary depending on how you set things up. You can take the Tor over VPN approach, or the VPN over Tor approach. The developers of the Tails Operating System (which uses Tor by default) are opposed to using a VPN with Tails except in very specific circumstances.

Arguments against Using Tor and a VPN

Likewise, the Tor Project team advises setting up something called a Tor Bridge as an anonymous entry point into the Tor network.

In both these cases, the idea is that a VPN is not a true anonymous service since the VPN provider does have identifying information about you. In other words, you need to be able to trust your VPN.

Arguments for Using Tor and a VPN Together

The arguments for using Tor and a VPN together look at the ways that using both together can address some of the weaknesses of each. For example, Tor alone could be vulnerable to attacks on its Exit Relays, while a VPN alone is vulnerable to men with guns showing up at its offices and demanding information.

Arguments for Using Tor and a VPN

To get more specific about the arguments for (and against) using Tor and a VPN together, we need to look at the two ways of doing so: Tor over VPN, and VPN over Tor.

Using Tor over a VPN

In the Tor over VPN approach, you start your VPN before you connect your browser to the Tor network. For simplicity, we will assume that you are using the Tor Browser (the browser) for the most secure connection to Tor and that you want to visit the xyz.com website.

Tor over VPN
  • First, you start the VPN. This establishes an encrypted connection between your computer and a VPN server. Your ISP knows your IP address and can see that you are connected to a VPN, but can’t read the data that passes along the encrypted VPN connection.
  • Next, you start the Tor Browser and enter the address of xyz.com. The browser establishes a path through the Tor network and encrypts the data it is sending to xyz.com. The VPN can see that the browser is sending encrypted data to a Tor Guard Relay.
  • The data passes through the VPN network and exits through the VPN server. The data is still protected by the encryption from the browser.
  • The VPN server passes the data to the Tor network. It enters a Guard Relay, which thinks the message originated at the VPN server. The Guard Relay strips off the outermost layer of encryption and passes the message to a Middle Relay.
  • The Middle Relay strips off the next layer of encryption and passes the message to an Exit Relay.
  • The Exit Relay strips off the final layer of Tor encryption and sends the data to xyz.com. The Exit Relay can read the content of the message but doesn’t know the origin IP address.

Data passing from xyz.com to your browser follow the reverse route.

TOR and VPN

Pros and Cons of using Tor vs VPN

ProsCons
This is easy to implementYour VPN will see that you are using Tor
Your ISP won’t know you are using TorIf your VPN drops your use of Tor could be visible
Your IP address won’t be visible at the Exit RelayYour data will be unencrypted at the Exit Relay
Tor sees your traffic as originating at the VPN, not your IP addressIf your VPN keeps logs, those logs could be used to reveal your IP address
An attacker needs to get past both Tor and your VPNUsing Tor and a VPN together is slower than using one or the other
Your data is encrypted before the VPN can see itUsing Tor over a VPN won’t help you if the Tor Exit Relay is blocked
You still have access to Tor’s Onion Services

One last thing to consider. VPN providers have strong incentives to protect your privacy. ISPs have much less incentive and are easily subject to government pressure to record your activities and turn over records about you. In the United States, ISPs can legally gather and sell information about your online activities without your consent.

The Tor over VPN approach relies less on the trustworthiness of your ISP and more on that of your VPN provider.

Using a VPN over Tor

In a VPN over Tor setup, the VPN encrypts each connection in the Tor network. On the positive side, in this approach, your data is still protected by the VPN’s encryption when it leaves the Tor Exit Relay. Drawbacks to this approach include:

  • That you can’t use it to access Tor’s Onion Services.
  • Your ISP can see you are using Tor, which could invite unpleasant government attention.
  • This is much harder to implement than Tor over VPN. Check out this guide to one approach at the 'Exposing the Invisible' website to see what we mean.
VPN over Tor

Pros and Cons of VPN over Tor

ProsCons
Your VPN will see the Tor Exit Relay, not your actual IP addressYour ISP can see you are connected to Tor
The VPN may allow you to access sites that block Tor Exit RelaysYou can’t access Tor’s Onion Services since the final link in the chain of connections is your VPN, not a Tor Exit Relay
You can choose the location of the VPN server to get access to geo-blocked contentThe VPN provides a fixed endpoint in the chain of connections. This could be used by a global adversary to find your IP address using end-to-end timing analysis
Using Tor and a VPN together is slower than using one or the other

While VPN over Tor does have some benefits, we think that Tor over VPN is the better approach. If nothing else, choosing this approach leaves you more dependent on the trustworthiness of your ISP than Tor over VPN.

Our Recommended Approach: Using Tor over a VPN

We think that the Tor over VPN approach offers a better privacy solution for most users with normal needs. If you are a spy, or otherwise at really high risk of really painful consequences, there are stronger solutions such as Qubes. But for most normal folks, a Tor over VPN solution looks good. The following video offers a nice summary of the pros and cons.

This solution is also surprisingly easy to set up. Which you can read more about below. But first, here's a few considerations:

  • Your traffic over tor and VPN will be much slower than normal browsing.
  • Many sites may not work, or be incredibly limited in their functionality.
  • You could find that streaming services don't work, or they will be incredibly slow.

If you still feel that Tor over VPN is suitable for your browsing and privacy needs, read on.

How to Set Up Tor over VPN

Setting up a Tor over VPN configuration is pretty simple, and it isn’t dependent on your choice of operating system or anything like that.

How to set up TOR over VPN

Follow these instructions to set up and use Tor over VPN:

  • Step 1: Purchase, download, and install the VPN of your choice. A VPN that doesn’t keep logs is better than one that does. And a VPN that doesn’t keep logs and accepts anonymous payments using Bitcoin is better yet. (Check out our best vpn guide for the VPNs we recommend)
  • Step 2: Launch your VPN and make sure it is working properly.
  • Step 3: Download and install the version of the Tor Browser for your operating system from the official TorProject Download page.
  • Step 4: Verify the file signature to ensure that your download hasn’t been tampered with. In the image below, the red arrow points to the sig link. Click here for information on what this is all about and how to verify it.
Verify Tor’s Download
  • Step 5: Once you have verified the Tor download, install it using the standard procedures for your Operating System.
  • Step 6: Ensure that your VPN is active and launch the Tor Browser. You can now browse using Tor over VPN.

It is important to remember that you must launch the VPN before you launch the Tor Browser if you want to get the benefits of this approach.

Conclusion

While there remains some controversy about it, we believe that there are clear benefits to using both Tor and a VPN together.

In this article, we’ve looked at each of these tools and the ways they help you preserve your privacy online. We also looked at the two ways they can be used together and arguments for and against each. We wrapped up with a quick guide on how to boost your online privacy by setting up the Tor over VPN approach on your own system.

We hope you found this guide useful and if you are currently looking for a VPN provider, we recently compared two of the leading services which can be found here:

References

Disclosure: Blokt strives to provide transparent, honest reviews, and opinions. The writer of this article is a user of the product(s) or service(s) mentioned in this article and was not influenced by the respective owners.

We rarely run ads, but sometimes earn a small commission when you purchase a product or service via a link on our site. Thank you kindly for your support.

Read more or donate here.

Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.

LEAVE A REPLY

Please enter your comment!
Please enter your name here