Combining Tor and VPN for unmatched online privacy | The Independent (2024)

In the pursuit of online privacy, two tools often take centre stage: The Onion Router (Tor) and Virtual Private Networks (VPNs). Individually, both offer significant advantages.

Tor enables anonymous communication, while VPNs protect your data by encrypting your online activity and hiding your real IP address. However, combined, they form a powerful shield for enhancing online security and anonymity, safeguarding users from data breaches and other cyberthreats.

In this article, we explore the benefits of using Tor and VPN together, explain their operation, and guide you through the setup process. We also debunk some common myths surrounding their combined usage.

Understanding Tor and VPN

Tor is a powerful, open-source tool designed to facilitate anonymous online communication. It uses a multi-layered routing strategy to mask your online activities, making them much more difficult to trace.

How Tor works

When you access the internet through Tor, your traffic doesn’t take a direct route to its destination. Instead, it’s sent on a zigzag path through multiple randomised nodes, giving Tor its distinct layering effect, akin to the layers of an onion.

When you initiate a request, Tor wraps it in three layers of encryption. This request then travels through at least three servers or nodes: the entry node, the relay node and the exit node.

  • Entry node: Your encrypted traffic first reaches an entry node. While this node can see your real IP address, it can’t read your encrypted data. It removes one layer of encryption and forwards your data to the next stage.
  • Relay node: The relay, or middle, node receives the partially decrypted data. It doesn’t know your real IP address or your request’s final destination. The relay node strips away another layer of encryption and sends your data to the final stage.
  • Exit node: The exit node removes the last layer of encryption. It can see where your traffic is going and its content without knowing its origin. The exit node sends your unencrypted data to its final destination.

Tor is generally accessed through the Tor Browser, which is optimised for heightened security and privacy. Although the system is slower due to its complex routing process, it remains an effective tool for anonymising your internet traffic.

The role of VPNs

VPNs play a significant role in encrypting and tunnelling internet connections. They function by creating a secure, private tunnel between your device and the internet. All data that passes through this tunnel is encrypted, which makes it unreadable to anyone who might intercept it, including your internet service provider (ISP) or potential hackers.

Unlike Tor, which is a free and open network, a VPN is typically a paid service (although there are free VPN options) and all your data is routed through the VPN’s servers. Reliable VPN providers do not keep any user logs to maintain privacy.

Individual benefits

Both Tor and VPN have their advantages and potential limitations. Tor’s strength lies in its ability to anonymise internet traffic effectively. However, it can be slower and less efficient due to its routing process. Also, by default, Tor only protects your browsing data, not applications running on your device.

On the other hand, a VPN offers comprehensive encryption of all your internet data and is typically faster than Tor. However, it entails entrusting the VPN provider with all your data going through its servers. It’s also important to note that, while both tools significantly enhance online privacy, neither provides 100 per cent guaranteed anonymity.

Benefits of combining Tor and a VPN

Pairing Tor and a VPN leverages the unique strengths of both tools, creating a robust shield for your online privacy and security. While Tor provides unparalleled anonymity by routing your traffic through multiple nodes, a VPN complements this by encrypting your entire network connection, cloaking your digital activities.

Combining Tor and VPN can slightly impact browsing speeds due to the additional encryption. But if you prioritise utmost privacy and security over speed, this minor inconvenience is a small price to pay.

There are two common ways to use Tor and VPN together:

Tor over VPN: Best for enhanced privacy

With the Tor over VPN method, you first connect to a VPN, then to the Tor network. This approach offers a significant benefit; the VPN encrypts the data before entering the Tor network. Thus, your real IP address is masked with the VPN’s IP address, adding an extra layer of security and privacy.

The benefits of this approach are:

  • Your ISP can’t see that you’re accessing the Tor network, which enhances your privacy.
  • The Tor entry node doesn’t see your real IP address, which adds another layer of anonymity.

VPN over Tor: Best for strengthened anonymity

The VPN over Tor method works the other way around: You first connect to Tor, then to the VPN. This method offers the following advantages:

  • It permits access to sites that disallow connections from known Tor exit nodes.
  • The VPN provider can’t see your real IP address but only that of the Tor exit node, offering even more anonymity.
  • All your VPN traffic passes through the Tor network, providing comprehensive coverage.

Although it offers enhanced anonymity, we don’t recommend the VPN over Tor method. It involves first connecting to the Tor network, followed by the VPN. However, such a set-up reintroduces an element of trust into an otherwise trustless situation, as your VPN service could see your traffic.

While it’s true that a VPN that does not keep activity or connection logs may be trusted with this information, the trade-off is the additional complexity and slower speeds due to routing through the Tor network. Here are a few points to consider:

  • You can access sites that block connections from known Tor exit nodes
  • The VPN provider only sees the IP address of the Tor exit node, not your actual one
  • All VPN traffic goes through the Tor network, offering comprehensive coverage

However, we caution against this method due to these significant concerns:

  • It could considerably slow down your VPN
  • Additional configuration may be required, potentially needing technical knowledge and patience
  • The VPN provider, instead of the Tor exit node, would be able to see your traffic, negating some anonymity benefits

In both configurations, trust in your VPN provider remains essential. An audited no-logs VPN provider can add a significant layer of security, ensuring that your online activities remain private and secure.

Setting up Tor and VPN together

Setting up Tor and VPN together, commonly known as Tor over VPN or Onion over VPN, ensures high privacy protection. Here’s a straightforward guide to get you started:

Step 1: Install VPN client

Download and install the VPN client on your device. Many providers offer clients for various operating systems, including Windows, MacOS, Linux, Android, and iOS.

Step 2: Connect to a VPN server

Launch your VPN client and connect to a server. To optimise connection speed, select a server closest to your location.

Step 3: Download and install the Tor browser

The Tor Browser is free to download and install. It’s available for various operating systems and even as a portable version.

Step 4: Launch the Tor browser

Once you’ve connected to your VPN, open the Tor Browser and connect to the Tor network.

You’re now using Tor over VPN, providing an extra layer of security and privacy. This method obscures your home IP address, ensures encrypted traffic, and enables access to the Tor network even where it may be blocked.

Best VPNs for Tor browser

We highly recommend using the following VPNs for the optimal Tor over VPN setup:

  • NordVPN: A top-tier choice for Tor browsing with high-grade encryption and impressive speed
  • Surfshark: A cost-effective solution offering robust security measures and unlimited device connections
  • ExpressVPN: Noted for its superior security and high-speed servers, it provides a seamless Tor browsing experience
  • CyberGhost: Best for high-speed servers and user-friendly apps, it’s ideal for speedy browsing on Tor

How to use Tor and VPN together: Best practices and considerations

When using Tor and VPN together, there are some key points to keep in mind to ensure the most secure and efficient browsing experience.

Regularly update

Keep both your VPN and Tor software up to date. Updates often include important security patches and performance improvements.

Choose reputable providers

Not all VPNs are created equal. Stick with trusted providers known for strong security measures, no-log policies, and high-speed servers. While there are some decent cheap VPNs out there, pay for the level of security with which you feel comfortable.

Consider performance impact

While providing an extra layer of security, the combined use of Tor and VPN can significantly impact your internet speed. Be prepared for slower load times.

Protect against IP leaks

Use the features of your VPN, such as the kill switch, to ensure that your IP address isn’t exposed.

Remember, no solution offers 100 per cent security or anonymity. Always exercise caution and make informed choices about your online privacy and security.

Common misconceptions about using Tor and VPN together

Illegality

A prevalent misconception is that the combined usage of Tor and VPN is illegal. In reality, using these tools for privacy and security is perfectly legal in most jurisdictions. However, the content accessed and actions taken while using these tools must comply with local laws.

Complete anonymity

Another common myth is that Tor over VPN makes you completely anonymous. While this setup greatly enhances your privacy, no tool can provide absolute anonymity. Your behaviour online, your device’s security and your VPN provider’s policies all play a crucial role in maintaining your privacy.

Final takeaways: Combine Tor and VPN for enhanced privacy

Pairing Tor and VPN is a viable way to improve online privacy. The optimal method is to use Tor over VPN, which entails connecting to a robust VPN service, such as NordVPN, before launching the Tor browser.

Remember that this layering of security tools might affect your internet speed due to the enhanced encryption process. Despite this, the trade-off is worthwhile for an increased layer of privacy.

You don’t need to worry about legal issues when using Tor and a VPN together, as it is entirely legal. However, updating both applications to ensure maximum security benefits is essential.

Frequently asked questions

Yes, using a VPN with Tor does provide additional security. The VPN encrypts your internet traffic before it even enters the Tor network, adding an extra layer of security. This combination also prevents your internet service provider from seeing that you’re using Tor, which can be beneficial in regions where Tor usage is blocked.

Yes, it’s legal to use Tor and a VPN together. However, while this combination can enhance security and anonymity, it can significantly reduce internet speed. It’s worth noting that the legality of their usage doesn’t cover illegal activities carried out while using these tools. Always use them responsibly.

Absolutely, you can use the Tor browser with a VPN. Doing so adds an extra layer of privacy and security, as it hides your IP address from Tor nodes and provides access to the Tor network where it might be blocked. Simply connect to your VPN first, then launch Tor.

No, you don’t need a specific VPN protocol to use with Tor. Most VPNs use robust protocols, such as OpenVPN or IKEv2, which are well suited for working with Tor. Choosing a reliable VPN provider that respects your privacy and doesn’t keep logs is more important than focusing on a specific protocol.

Yes, combining Tor and VPN will likely impact your internet speed. Both Tor and VPNs encrypt your data, adding processing time, and Tor routes your traffic through multiple nodes worldwide, further slowing things down. As a result, you may notice slower browsing speeds when using Tor and a VPN together.

Round up of today’s best VPN deals

NordVPN 2 year £2.49 /Month

£2.49 /Month

Surfshark 24 month £1.69 /Month

£1.69 /Month

ExpressVPN 12 month £6.80 /Month

£6.80 /Month

CyberGhost 2 year £1.92 /Month

£1.92 /Month

Proton 2 year £3.85 /Month

£3.85 /Month

PIA 2 year £1.69 /Month

£1.69 /Month

Atlas 2 year £1.34 /Month

£1.34 /Month

PrivadoVPN 2 year £1.48 /Month

£1.48 /Month

Windscribe 12 month £4.54 /Month

£4.54 /Month

IPVanish 2 year £2.09 /Month

£2.09 /Month

Mariana Krasteva

Author

Mariana is an experienced technology writer specialising in web and internet technology. She writes about cyber security, including VPN; web development; and software engineering. She has been writing since 2006 and held a position of English lecturer at Technical University of Varna in Bulgaria until 2022, working in a variety of educational fields.

For the Independent Advisor, Mariana writes about the usefulness of VPNs and how people can protect themselves and their data online.

Amy Reeves

Editor

Amy is a seasoned writer and editor with a special interest in home design, sustainable technology and green building methods.

She has interviewed hundreds of self-builders, extenders and renovators about their journeys towards individual, well-considered homes, as well as architects and industry experts during her five years working as Assistant Editor at Homebuilding & Renovating, part of Future plc.

Amy’s work covers topics ranging from home, interior and garden design to DIY step-by-steps, planning permission and build costs, and has been published in Period Living, Real Homes, and 25 Beautiful Homes, Homes and Gardens.

Now an Editor at the Independent Advisor, Amy manages homes-related content for the site, including solar panels, combi boilers, and windows.

Her passion for saving tired and inefficient homes also extends to her own life; Amy completed a renovation of a mid-century house in 2022 and is about to embark on an energy-efficient overhaul of a 1800s cottage in Somerset.

More articles like this

  • Best VPN
  • Best free VPN
  • Best Android VPN
  • Best cheap VPN
  • Best Chrome VPN
  • Best Firestick VPN
  • Best iPhone VPN
  • Best Mac VPN
  • Best VPN deals
  • VPN free trials
  • Atlas free VPN review
  • Atlas VPN review
  • CyberGhost VPN review
  • ExpressVPN review
  • Hide.me free VPN review
  • HMA VPN review
  • IPVanish VPN review
  • Nord VPN review
  • PIA VPN review
  • Privado free VPN review
  • Privado VPN review
  • Proton free VPN review
  • Proton VPN review
  • Surfshark VPN review
  • Windscribe free VPN review
  • Windscribe VPN review
  • Data breaches and stats
  • Cybercrime statistics
  • VPN definitions
Combining Tor and VPN for unmatched online privacy | The Independent (2024)

FAQs

Should you combine VPN and Tor? ›

VPN + Tor = Best for security

When it comes to achieving anonymity on the internet, it is currently unbeatable, and it may be the only thing that can thwart the surveillance of a well-funded and sophisticated adversary. Using Tor over VPN only increases your privacy.

Can you be tracked with a VPN and Tor browser? ›

Encryption: A VPN encrypts all of your traffic, including your browsing, app traffic, and file transfers. This makes it much more difficult for anyone to track your online activity. Tor only encrypts your browsing traffic, so your ISP and other third parties can still see what websites you are visiting.

How safe is Tor browser with VPN? ›

You can reinforce Tor's weak spots by pairing it with a VPN that provides end-to-end encryption. That means your web traffic will be encrypted at the entry and exit nodes of the Tor network, and using VPN-over-Tor will keep your real IP address safe from anyone lurking at those gateways.

Can the government track you if you use VPN? ›

Can police track online purchases made with a VPN? There is no way to track live, encrypted VPN traffic. That's why police or government agencies who need information about websites you visited have to contact your internet service provider (ISP for short), and only then your VPN provider.

Is Tor and VPN overkill? ›

You can connect to your VPN and then use the Tor Browser if you're really concerned, but combining the two is overkill for most people. You're better off using Tor if you need complete anonymity in extreme circ*mstances. If it's just all-round internet privacy you're looking for, choose a VPN.

Can your ISP see what you do on Tor? ›

Though Tor does hide your online activity and location, your ISP knows when you use the browser and may report your usage to the authorities, so interested parties can keep a sharp eye on you.

Do police track Tor users? ›

Law enforcement can also use a technique called “TOR-Exit-Node” monitoring, where they monitor the IP addresses of the exit nodes in the TOR network, when a user makes a request to a website outside the TOR network, the request will exit the TOR network via an Exit-Node, this exit node IP address can be used to trace ...

Does the government track Tor users? ›

Is a Tor Browser Traceable? While the Tor network is designed to provide anonymity and make tracking difficult, it is not entirely untraceable. Highly skilled individuals or organizations, such as government agencies, may have the capability to de-anonymize some Tor traffic using advanced techniques.

Can WIFI owner see what sites I visit on Tor? ›

When using Tor Browser, no one can see the websites that you visit. However, your service provider or network admins may be able to see that you're connecting to the Tor network, though they won't know what you're doing when you get there.

Is Tor illegal in the US? ›

Tor is legal in the US. You won't likely get in trouble just because you use the Tor browser. However, Tor is not a lawless domain, so you can't use this browser for illegal activities. If you use Tor for buying drugs or weapons, you are held responsible against the law.

Does VPN and Tor make you anonymous? ›

VPN over Tor: Best for strengthened anonymity

It permits access to sites that disallow connections from known Tor exit nodes. The VPN provider can't see your real IP address but only that of the Tor exit node, offering even more anonymity.

Is DuckDuckGo a Tor browser? ›

DuckDuckGo is the default search engine in Tor Browser. DuckDuckGo does not track its users nor does it store any data about user searches. Learn more about DuckDuckGo privacy policy.

Can the FBI track me if I use a VPN? ›

The FBI and other law enforcement agencies cannot track encrypted VPN traffic, even if they have a court order. However, they may force your internet service provider (ISP) to disclose your connection and usage logs, which will show that you use a VPN.

Can cops trace VPN? ›

The good news is that there is almost no way to track live, encrypted VPN traffic. Law enforcement can only obtain data, if available, about websites visited and so on. Otherwise, hackers and snooping government agencies are generally blocked by the fact that the data is encrypted.

Can someone tell if you are using a VPN? ›

Can someone tell if you're using a VPN? Websites and other online services you visit can see the IP address of the VPN server you're connected to. If they want to, they can check that IP address against lists of known VPN and proxy servers to see if you're using a VPN.

What is the best VPN to use with Tor? ›

ExpressVPN — Best Overall VPN for Tor Browser. Editors' Note: ExpressVPN and this site are in the same ownership group. ExpressVPN is the best VPN for the Tor browser in 2024. It's compatible with Tor traffic, provides very strong security and privacy features, and has very good speeds.

Does Tor change your IP address? ›

When you first open Tor, you're prompted to connect to the Tor network. This connects you to a relay and assigns you a browsing IP address that's different than your current home, work, or school IP address. If you just want to browse the web from a new IP address, this is all you'll need to do to get one!

What is the difference between Tor over VPN and VPN over Tor? ›

Tor over VPN lets you access the dark web with added security, while VPN over Tor serves to shield you from your VPN's view. While both have their pros and cons, you'll likely get the most use out of Tor over VPN.

What does onionize do in Tor? ›

Onionize: Tor v3 onion services (hidden services) for Docker containers. A docker wrapper for Tor v3 onion services (hidden services). It uses docker-gen to configure Tor automatically when other containers are connected to the same network.

Top Articles
Latest Posts
Article information

Author: Carmelo Roob

Last Updated:

Views: 6588

Rating: 4.4 / 5 (45 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.