
We live in a world where the FBI can now look at your browsing history without a warrant – and that’s just the US. Developments like these are making a lot of people more cautious about their online privacy. Some turn to virtual private networks (VPN) to secure their everyday browsing. Others turn to Tor solutions to hide their trails. But what about combining these approaches? Is it possible and what would the benefits and the downsides be? Let’s find out.
Using Tor over a VPN: in short
Tor refers to both the software for making your internet traffic untraceable and the volunteer network of servers that makes it possible. It’s secure but too slow for everyday use, and the security can be compromised by malicious agents setting up their own servers.
Meanwhile a VPN is a simpler and faster approach to securing your connection by encrypting your data and routing it via a VPN server. It’s great for everyday use. However, by combining them together, you can protect yourself from people trying to spy on you via compromised Tor routers. We explain it in more detail further on.
Table of contents
What is Tor?

Tor is the name of the software for anonymous communication and the network it uses to carry this out. It’s usually accessed via the Tor Browser maintained by the Tor Project, though there also exists an operating system called Tails that routes all of your internet traffic via the network.
The title itself comes from The Onion Router. No, it doesn’t have anything to do with the satire website of said name. However, it does deal with layers.
How does Tor work?
To keep your identity anonymous, Tor software bundles your data into three layers of encryption. Tor routes your data via three nodes (the servers established by volunteers) before it reaches online.
Each node removes a layer (with the previous address on it) to reveal the address of the next node. In essence, only the first node – called “the entry node” – knows who is sending data but not what that data is, while the third node is the only one to know what data is sent – but not where it comes from.
But how is it different from a VPN?
What is a VPN?

VPN stands for “virtual private network.” It recreates the security of two computers communicating without intervening links but by using the internet. It’s like laying down a direct wire to the other device without leaving your home.
How does a VPN work?
VPNs accomplish that task via tunneling. Your data is split into packages and sent via a virtual tunnel between your device and the destination. Those packages are encrypted so that nobody would know what you’re sending.
Finally, that data is routed via a VPN server, which allows VPN to do things like hide your IP and make you appear as if connecting from another place (city or country).
Why use Tor over a VPN?

Using Tor with a VPN is a good way to add another layer of security. This is because a VPN protects you in case the Tor network is compromised, and it hides Tor use.
Both of the technologies are good at what they do, but they have their own downsides:
VPN downsides | Tor downsides |
---|---|
May keep data log logs on the server side (look for VPN providers with no-log policies) | Nodes may be compromised and expose your data. This way, your browsing history could be reconstructed. |
Your ISP or government might get suspicious if you’re using Tor. |
To avoid these, you can use Tor over a VPN. The VPN will shield your data on its way to the entry node. Your ISP won’t be able to see that you’re using Tor – only that you’re using a VPN (and good VPNs can obfuscate even that). And when your data reaches the entry node, it will show the IP of the VPN server, not your device – meaning that IP is hidden and it can’t be traced back to you.
At the same time, Tor encrypts data by itself. So when it goes over the VPN server, the server can’t register what you’re actually doing – it can only see that you’re using Tor.
But how do you combine Tor and a VPN? Turns out, it’s quite easy to do. Read on and follow our quick, simple guide.
How to use Tor over a VPN
It’s not that hard to use Tor with a VPN – you just need a trustworthy and secure VPN provider (and the Tor Browser, obviously). Here’s a short guide using Surfshark VPN as an example.
- Sign up for Surfshark.
- Download and install the client.
- Sign into the client.
- Click “Connect” to connect to the fastest server.
- Download and install the Tor Browser.
- Launch the Tor Browser and connect to the Tor network.
- That’s it!
Now, Tor is already slow due to all the nodes, so you may experience a slight additional speed drop due to adding the VPN server to the chain.
But what if you wanted to try a VPN over Tor?
What about a VPN over Tor?
It is possible to set up a VPN to work over Tor. Or rather, to put a VPN after the Tor node network. This is useful if you want to access websites that don’t allow Tor connections. Here’s the Tor Project’s list of websites that either block Tor connections or ask for additional verification when you use Tor.
Is it safe, easy to use, or at all recommended? No, it’s not. It forgoes the most important reason for using Tor over a VPN – namely, keeping your identity secret from the person who hosts the entry node. Neither does it mask Tor use from scrutiny by your ISP.
So unless you really, really need to use a website that doesn’t accept connections from the Tor network, stick to Tor over a VPN.
So, what’s the difference between Tor over a VPN and a VPN over Tor?
In short, the difference between using Tor over a VPN vs. a VPN over Tor are:
Tor over a VPN | VPN over Tor |
---|---|
Your traffic is not protected at Tor’s exit nodes. | Your traffic’s protected at Tor’s exit nodes. |
Your ISP can’t see that you’re using Tor, but can see that you’re using a VPN. | Your ISP can’t see that you’re using a VPN but can see that you’re using Tor. |
Some sites might block you because they see Tor traffic. | Allows you to access sites that block Tor traffic. |
Can access .onion sites. | Can’t access .onion sites. |
Tor entry nodes can’t see your real IP address. | Tor entry nodes can see your real IP address. |
Doesn’t allow your Tor node host to see your real IP address. | Allows your Tor node host to see your real IP address. |
As mentioned above, I recommend you use Tor over a VPN. It’s both more secure and easier to set up, unless you want to access sites that block Tor traffic.
Surfshark and Tor: Do they work together?
Tor and Surfshark have zero problems working together. You can use Tor over a Surfshark connection any time you want increased privacy. And if something goes wrong (which is very rare) contact our support team and they’ll help you solve it.

Using Tor over VPN: The rundown
Tor and VPNs are both great means to enhance your security and privacy online. Naturally, using them together only increases your gains. But it’s up to you to decide if the effort is worth it. If you’re a regular user who doesn’t take part in politically sensitive activities or if security while streaming movies and playing games is something you desire, you’re better off with just a VPN.