NetworkingIntermediate11 min read

VPN vs Tor: When to Use Which

A clear-eyed comparison of VPNs and Tor — their actual privacy properties, limitations, and the right use case for each.

VPNs and Tor are both tools for modifying how your internet traffic reaches its destination, but they work very differently, offer different privacy guarantees, and are suited for different threat models. The marketing hype around VPNs and the mystique around Tor both obscure the reality. Understanding what each tool actually does — and does not do — is essential for making the right choice.

How VPNs Work

A VPN creates an encrypted tunnel between your device and a VPN server. Your internet traffic exits through the VPN server's IP address instead of your own. This hides your real IP from the websites you visit and hides your browsing destinations from your ISP. However — and this is critical — the VPN provider itself can see all of your traffic. You are not eliminating the observer; you are choosing a different one.

  • Hides your IP address from destination websites and services.
  • Encrypts traffic between you and the VPN server, preventing your ISP from inspecting your browsing.
  • Does NOT make you anonymous — the VPN provider sees your real IP and all your traffic.
  • Requires trust in the VPN provider's no-logs claims, which are rarely independently verifiable.
  • Offers fast speeds suitable for streaming, downloads, and everyday browsing.

How Tor Works

Tor routes your traffic through three relays (guard, middle, exit) operated by different volunteers around the world. Each relay only knows the relay before it and the relay after it — no single relay knows both who you are and what you are accessing. This architectural design means you do not need to trust any single operator.

  • Provides strong anonymity against most adversaries, including the destination server and any single relay operator.
  • Does NOT require trust in any single entity — the security comes from the distributed architecture.
  • Vulnerable to traffic correlation by a "global passive adversary" that can observe both your entry and exit traffic simultaneously.
  • Significantly slower than a VPN due to three-hop routing and volunteer-operated infrastructure.
  • Accessing Tor may itself be flagged by your ISP or employer. Tor bridges can help circumvent blocking.
  • The Tor Browser bundles anti-fingerprinting protections that a VPN alone does not provide.

When to Use a VPN

  • Preventing your ISP from logging your browsing history and selling it to data brokers.
  • Accessing geo-restricted content (streaming services, news sites blocked in your region).
  • Securing your connection on untrusted networks (public Wi-Fi at cafes, airports, hotels).
  • Adding a layer of separation between your IP address and non-sensitive online accounts.
  • Preventing your employer or school network from monitoring your personal browsing.

When to Use Tor

  • When you need actual anonymity — your identity must not be linkable to the activity.
  • Accessing sensitive resources (whistleblower platforms, censored information, human rights resources) where exposure could endanger you.
  • Browsing .onion services that are only accessible through Tor.
  • When you cannot trust any VPN provider (state-level adversary who could compel or compromise providers).
  • Research and OSINT investigations where you must not leave a trail connecting back to your organization.

Warning

Do NOT use VPN + Tor (connecting to a VPN then routing through Tor) unless you have a very specific and well-understood reason. This adds a permanent entry point (the VPN) that a VPN provider or adversary could use for traffic correlation. The Tor Project explicitly recommends against this for most users.

Choosing a VPN Provider

If you decide a VPN fits your threat model, choose a provider carefully. Look for providers that have undergone independent security audits, operate under a jurisdiction with strong privacy laws, have a clear and verifiable no-logs policy, support modern protocols (WireGuard or OpenVPN), allow anonymous payment (cryptocurrency or cash), and do not require personally identifying information to register.

Tip

A VPN is not a magic privacy wand. If you log into Google, Facebook, or Amazon through a VPN, those companies still know who you are. A VPN changes your IP address — it does not change your identity. Combine a VPN with the browser privacy techniques discussed in our other guides for meaningful protection.