IntoGuide
Image default
Security

Tor vs VPN: Which one is better for Privacy, Anonymity and Security

The Onion Router and Virtual Private network are both the tools which people are looking for better Privacy, Anonymity and Security. In this post; I will be covering all the technical and conceptual aspects behind TOR and VPNs, and by the end of this post you will understand which technology is better suited for which purpose. So, let’s get started.

Anonymity

The first marketing point of most consumer grade VPNs as well as TOR , both of them are effectively shielding your true IP address and giving you a new one that supposedly can’t be linked back to your true location. VPNs do this by rerouting your connection through a single relay also known as hop, this relay is a server that in best case scenario is owned by the VPN provider itself and the more usual scenario is just a rented space on some other company’s server. Most providers give you the option of multiple hops but this is not a standard nor does it improve the anonymity in any way and here is why?

Your VPN provider acts as your entry and exit node they know your true IP address and they know what websites you visit, if they want to, they can log this activity at any time if they are required by law enforcement. They can hand over all your browsing data to them because many VPN services are paid and they have a money trail that leads straight to your bank account or credit card. Most cryptocurrencies aren’t anonymous anyway even worse for most VPNs signup requires providing some personal information such as your email, account name and password. These identifiers are forever tied to your browsing activity while using the VPN service.

On the contrary TOR by default reroutes your traffic through three relays, each one of the relays is operated independently and it is chosen at random. In the meantime VPN providers can create new hops anybody can run relay on TOR network, the benefit is that no single relay knows the full traffic, they only know the nearest entry and exit points. The random choice of these harps makes it very difficult for a single actor to operate more than one hub in your tour circuit and to mitigate that TOR automatically creates a new random circuit with a completely new set of relays each time you restart TOR network or roughly every 10 minutes.

So, connecting to a malicious exit node doesn’t compromise their security in the long run, this makes persistent tracking on TOR prohibitively costly and it renders mass surveillance and economical. The only successful way for a law enforcement to compromise a TOR user would be to correlate timings between their entry and exit connections. This is a lot of guesswork that requires precise targeting and loads of resources to be able to collect the data at both ends of the connection, this can’t be done on mass with current technology and only global adversaries such as the NSA or GCHQ have the capacity to successfully target TOR users. Because they already monitored the entire internet traffic. If done right, TOR can be used to escape even these targeted attacks but such option is simply not possible with any VPN provider. So the anonymity goes without any doubt to TOR .

Privacy

Privacy is a different concept than anonymity, while anonymity shields your identity, privacy hides your
activity. Many regular people that choose VPNs do so to prevent their eyes fees from spying on their browsing history and selling it to advertisers. What they don’t realize is that they are not enhancing their privacy they are just delegating the trust to a different company. Many VPN providers have been caught making money off of selling people’s browsing records but there are some reputable providers that don’t do that. However that doesn’t guarantee your ISP still can’t track your browsing history, Internet is just a network of networks, in the only way it works globally is because these networks are willing to give each other access into each other’s network through peering or transit connections or it places called internet exchange points. If your ISP meets with your VPN server on a pure network or an internet exchange point, if they can see what websites you’re visiting from that VPN server, as a matter of fact anybody within the reach of these points can do that.

TOR on the other hand is made to avoid building circuits within the same peering networks or internet exchange points that means when TOR reroutes or packets through three relays, it is traveling on three independent networks that don’t talk to each other and don’t exchange each other’s data. This successfully
mitigates the threat of adversaries like your ISP trying to snitch your browsing activity at remote servers. So, Privacy is also in favor of TOR.

Security

VPNs are all about encryption, they encrypt your data, that’s true but what’s also true is that encryption has to be supported at both ends in order to work. And VPNs encrypt your traffic on your device and decrypted on the server that they control, that means your traffic leaves your VPN network without the VPN encryption. Consumer-grade VPNs are not self-sustained overlay networks, they’re basically just tunnels that transfer your traffic to a different place before it enters the internet. TOR does the same but just about three times better, TOR encrypts our traffic three times once for each relay to individually prevent relay operators from eavesdropping on your traffic much like with VPNs. Once your traffic leaves TOR exit node, it enters the internet unencrypted, however TOR is more, than that it’s an overlay network which means tor can host onion web sites, these onion web sites are part of the tour encryption so if you are using TOR to access onion servers your entire traffic from the moment your device initiates the connection all the way through to the encrypted onion server is fully encrypted and hidden from the clear internet. You can’t do that with consumer VPNs and so TOR wins this round again.

Trust

If anyone can run their relay on a tour network, this means bad guys and the government can also run them. which means they can monitor what I do and you’d be correct, TOR is completely free and opensource, anyone can run it and anyone can try to abuse it but that’s the only way to achieve anonymity. Even only a small group of people used TOR, it will be easy to identify them. The more people use TOR the stronger everybody’s anonymity gets this is why TOR uses what is called a trust less design. As a user of TOR you are not required to trust any single provider, you can always reroute your traffic at any time relay operators acquire no personal data from you and no provider can choose to serve a node specifically for you. Users have the ultimate power.
TOR project is a nonprofit, it’s code is released as a free software which means it is open and without any copyright restrictions there is no central authority in control of TOR. Almost everything is the exact opposite with VPNs, they are centrally owned by a single company, they are the ones that choose which servers you can select and you have to trust them with their data if they promise you not to keep any locks or not to sell your data, it’s just a promise that you will never be able to verify or hold them accountable for. Your VPN provider is in control of your traffic at all times on the Internet. the only trustworthy system is the one you don’t have to trust at all.

Ease of Use

TOR is not difficult to learn but it does require some learning, the easiest way to use TOR, is to get the TOR browser. There’s a version for own desktop operating systems and one official version for Android. this is only useful for browsing. Using TOR with other apps occasions and programs requires a little bit of familiarity with configuration and settings. TOR can be run system-wide but this can lead to errors that can anonymize you. The most stable way to use TOR on your system is to get tails or who names, both of these require experience with booting live operating systems and troubleshooting problems with some potential hardware and machine specific limitations. it can be done it’s just not for a soccer mom.

Most VPNs usually come with user-friendly apps with nice UI design with big buttons and pleasant color palettes, it is after all made by companies that want to make money and not to build the most secure system
possible, they can be used with virtually no user interaction via mobile apps or desktop clients. VPN apps immediately secure all network traffic on the device without any further configuration for individual apps. VPNs are business and businesses require happy customers.

Price and Censorship Resistance

There are free VPNs and there are paid VPNs, TOR comes free by default there is no paid version. With free VPNs you pay with your data, TOR doesn’t have this problem because there is no market for anonymized data from the TOR network, so, the price of VPN is either your data or their money or both. The price of TOR is sometimes their patients, censorship resistance, a lot of websites are blocking connections coming from TOR and they’re usually more permissive of VPN connections. Some countries block TOR point and VPN networks altogether, however TOR easily circumvents the censorship with TOR bridges, hit an entry relays that make it look like you are connecting to a regular internet. If using a VPN is prohibited in your country there’s not much you can do to hide the fact that you are using one so, TOR wins and the entry point and VPNs win at the exit point. Not due to technical superiority but simply because web sites are more willing to accept VPN users since they are much more easily identifiable so this round is played even.

Speed

There is no question three hops are always going to be slower than a single hop that’s why most VPNs are
faster than TOR. TOR easily obliterates Virtual Private Networks and almost all categories and even user friendly VPNs prevail is that a big issue because TOR can be learned if necessary. Overall if you’re
looking for a strong anonymity, privacy, security and ways to circumvent censorship and do all of these for free. TOR is your only solution, VPNs are useful for accessing geolocation restricted content and they’re generally faster than TOR. Simply due to them sacrificing stronger anonymity and security.

Related searches:

  • tor vs vpn reddit
  • tor vs vpn vs proxy
  • free vpn
  • express vpn
  • tor vpn review
  • best vpn
  • free vpn for tor
  • tor vpn download

Related posts

How to Secure Your Android Device from Emerging Cyber Threats: Best Practices and Quick Tips

Jack Fooley

How to Automate Home Security Systems with Arduino: A Step-by-Step Guide

Jack Fooley

Avoiding Four Of The Most Common Online Scams

Ghulam Abbas

1 comment

secT0R June 21, 2020 at 10:21 am

vpn – how funny. kproxy if …

Reply

Leave a Comment