We live in a world where the FBI can now look at your browsing history without a warrant – and that’s just the US. Developments like these are making a lot of people more cautious about their online privacy. Some turn to virtual private networks (VPN) to secure their everyday browsing. Others turn to Tor solutions to hide their trails. But what about combining these approaches? Is it possible and what would the benefits and the downsides be? Read this article and find out.
Tor refers to both the software for making your internet traffic untraceable and the volunteer network of servers that makes it possible. It’s secure but too slow for everyday use, and the security can be compromised by malicious agents setting up their own servers.
Meanwhile a VPN is a simpler and faster approach to securing your connection by encrypting your data and routing it via a VPN server. It’s great for everyday use. However, by combining them together, you can protect yourself from people trying to spy on you via compromised Tor routers. We explain it in more detail further on.
What is Tor?
Tor is the name of the software for anonymous communication and the network it uses to carry this out. It’s usually accessed via the Tor Browser maintained by the Tor Project, though there also exists an operating system called Tails that routes all of your internet traffic via the network.
The title itself comes from The Onion Router. No, it doesn’t have anything to do with the satire website of said name. However, it does deal with layers.
To keep your identity anonymous, Tor software bundles your data into three layers of encryption. Tor routes your data via three nodes (the servers established by volunteers) before it reaches online.
Each node removes a layer (with the previous address on it) to reveal the address of the next node. In essence, only the first node – called “the entry node” – knows who is sending data but not what that data is, while the third node is the only one to know what data is sent – but not where it comes from.
But how is it different from a VPN?
What is VPN?
VPN stands for “virtual private network.” It recreates the security of two computers communicating without intervening links but by using the internet. It’s like laying down a direct wire to the other device without leaving your home.
VPNs accomplish that task via tunneling. Your data is split into packages and sent via a virtual tunnel between your device and the destination. Those packages are encrypted so that nobody would know what you’re sending.
Finally, that data is routed via a VPN server, which allows VPN to do things like hide your IP and make you appear as if connecting from another place (city or country).
Why use Tor over VPN?
Using Tor with a VPN is a good way to add another layer of security. This is because a VPN protects you in case the Tor network is compromised, and it hides Tor use.
Both of the technologies are good at what they do, but they have their own downsides. For VPNs, you have to trust the provider of the VPN service. A VPN may keep your communications secret from ISP and hackers, but the VPN server can still read it and keep logs.
Note: only choose a VPN provider that has a strict no-log policy (like Surfshark)
As for Tor, there’s always a danger that the entry node may be compromised. After all, anyone can set it up – including hackers and intelligence agencies. The random selection of nodes lessens the risk, but it still exists. If both the entry and exit node are compromised, your browsing history can be reconstructed by matching times of communication – it’s called “correlation”.
Also, your ISP can see that you’re using Tor, which may make it suspicious or make you a target.
But if you use Tor over VPN, the VPN will shield your data on its way to the entry node. Your ISP won’t be able to see that you’re using Tor – only that you’re using a VPN (and good VPNs can obfuscate even that). And when your data reaches the entry node, it will show the IP of the VPN server, not your device – meaning that IP is hidden and it can’t be traced back to you.
At the same time, Tor encrypts data by itself. So when it goes over the VPN server, the server can’t register what you’re actually doing – it can only see that you’re using Tor.
But how do you combine Tor and VPN? Turns out, it’s quite easy to do. Read on and follow our quick, simple guide.
How to use Tor over VPN?
It’s not that hard to use Tor with a VPN – you just need a trustworthy and secure VPN provider (and the Tor Browser, obviously). Here’s a short guide using Surfshark VPN as an example.
3. Sign into the client
4. Click “Connect” to connect to the fastest server
6. Launch the Tor Browser and connect to the Tor network
7. That’s it!
Now, Tor is already slow due to all the nodes, so you may experience a slight additional speed drop due to adding the VPN server to the chain.
But what if you wanted to try VPN over Tor?
What about VPN over Tor?
It is possible to set up a VPN to work over Tor. Or rather, to put a VPN after the Tor node network. This is useful if you want to access websites that don’t allow Tor connections. Here’s the Tor Project’s list of websites that either block Tor connections or ask additional verification when you use Tor.
Is it safe, easy to use, or at all recommended? No, it’s not. It forgoes the most important reason for using Tor over VPN – namely, keeping your identity secret from the person who hosts the entry node. Neither does it mask Tor use from scrutiny by your ISP.
So unless you really, really need to use a website that doesn’t accept connections from the Tor network, stick to Tor over VPN.
Tor and VPN are both great means to enhance your security and privacy online. Naturally, using them together only increases your gains. But it’s up to you to decide if the effort is worth it. If you’re a regular user who doesn’t take part in politically sensitive activities or if security while streaming movies and playing games is something you desire, you’re better off with just a VPN.
Use Tor over Surfshark VPNGet Surfshark