VPN vs Tor
A VPN (virtual private network) routes your traffic through a single provider's encrypted tunnel — useful for privacy from your ISP and for reaching geo-restricted content. Tor (The Onion Router) routes your traffic through three randomly chosen volunteer nodes, with layered encryption, so no single party knows both who you are and what you're doing. Both improve privacy; they answer different threats and have different costs.
Last reviewed on 2026-04-27.
Quick Comparison
| Aspect | VPN | Tor |
|---|---|---|
| Trust model | Trust one VPN provider | Trust the network as a whole, not any single node |
| Hops | 1 (you → VPN → destination) | 3 by default (entry → middle → exit) |
| Speed | Often near full ISP speed | Notably slower; latency adds up across hops |
| Encryption | Strong, end-to-VPN; provider sees plaintext destination | Layered (onion routing); each node knows only its neighbours |
| Anonymity from sites | Site sees the VPN exit IP | Site sees a random Tor exit IP |
| Anonymity from the network operator | VPN provider sees what you do | No single node sees the full picture |
| Common use | Public Wi-Fi privacy, geo-unblocking, hiding from ISP | High-stakes anonymity, censorship circumvention, accessing .onion services |
| Cost | Usually paid (free tiers exist; pay for serious providers) | Free (volunteer-run network) |
Key Differences
1. How many parties you have to trust
With a VPN, you replace your ISP with the VPN provider as the entity that can see your traffic. The hop is encrypted to the provider, but the provider sees what you're visiting and could log it. Choosing a VPN is choosing whom to trust.
With Tor, no single party sees both who you are and what you're doing. The entry node knows your IP but not the destination; the exit node knows the destination but not your IP. That's the central design property.
2. How many hops
A VPN is one hop. Your traffic enters the tunnel and exits at the provider's IP. Latency overhead is small.
Tor is three hops by default. Each hop adds latency, often 100–300 ms each in the modern network. Total round-trip time is significantly higher than direct.
3. Speed
VPN speed is usually close to your normal speed once you connect to a nearby provider server. Streaming, calls, downloads — all generally fine.
Tor speed is much slower. Streaming HD video over Tor is impractical; even regular browsing feels meaningfully laggier. The compromise is intentional — speed buys you anonymity.
4. Threat models
VPN defends against your ISP, public Wi-Fi snoopers, and casual geographic restrictions. It does not anonymise you against the destination site, especially if you sign in to anything.
Tor defends against being identified by destinations and against any single party in the path. It's the right tool when the threat is "someone who can watch the network."
5. What you can reach
VPN reaches normal web destinations, possibly with the appearance of being in a different country.
Tor reaches normal websites and a separate set of .onion services that exist only inside the Tor network — a feature for sites that explicitly want to be anonymously hosted.
6. Real-world cost
VPNs are mostly paid. Free VPNs exist; the business model often involves looking at your traffic, which defeats the purpose. Reputable paid providers cost a few dollars a month.
Tor is free, run by volunteers. The cost is paid in latency, not money.
When to Choose Each
Choose VPN if:
- Public Wi-Fi protection (so the airport network can't see your traffic).
- Watching streaming content available in another country.
- Hiding general browsing from your ISP without the heavy speed tax of Tor.
- Remote workers connecting securely to a corporate network.
Choose Tor if:
- Journalists, activists, or anyone who genuinely needs network-level anonymity.
- Reaching .onion services that aren't available on the regular web.
- Living under network censorship that can be circumvented through Tor bridges.
- Researching sensitive topics where any single point of trust is too many.
Worked example
A traveller using free hotel Wi-Fi enables a VPN before signing in to webmail. The VPN keeps the hotel network from seeing the credentials and the email traffic — that's the right tool for that threat. Months later, the same person is reporting on a politically sensitive story; they switch to Tor for source-protection reasons. Different threat, different tool. Some setups even chain the two together (your traffic → VPN → Tor) for layered protection, though it adds friction and isn't necessary for most users.
Common Mistakes
- "VPNs make me anonymous." They make you private from the network in front of you. Sites you sign in to still know who you are.
- "Tor is illegal." Tor is legal in most countries. It's a tool; what people do with it can be legal or not.
- "A free VPN is the same as a paid one." Many free VPNs sell user data or run ads on your traffic. The right comparison is to a paid VPN with audited policies.
- "Tor is slow because it's broken." Tor is slow because every connection takes three hops by design. Slowness is a property, not a bug.