VPN vs Tor

A VPN (virtual private network) routes your traffic through a single provider's encrypted tunnel — useful for privacy from your ISP and for reaching geo-restricted content. Tor (The Onion Router) routes your traffic through three randomly chosen volunteer nodes, with layered encryption, so no single party knows both who you are and what you're doing. Both improve privacy; they answer different threats and have different costs.

Last reviewed on 2026-04-27.

Quick Comparison

AspectVPNTor
Trust modelTrust one VPN providerTrust the network as a whole, not any single node
Hops1 (you → VPN → destination)3 by default (entry → middle → exit)
SpeedOften near full ISP speedNotably slower; latency adds up across hops
EncryptionStrong, end-to-VPN; provider sees plaintext destinationLayered (onion routing); each node knows only its neighbours
Anonymity from sitesSite sees the VPN exit IPSite sees a random Tor exit IP
Anonymity from the network operatorVPN provider sees what you doNo single node sees the full picture
Common usePublic Wi-Fi privacy, geo-unblocking, hiding from ISPHigh-stakes anonymity, censorship circumvention, accessing .onion services
CostUsually paid (free tiers exist; pay for serious providers)Free (volunteer-run network)

Key Differences

1. How many parties you have to trust

With a VPN, you replace your ISP with the VPN provider as the entity that can see your traffic. The hop is encrypted to the provider, but the provider sees what you're visiting and could log it. Choosing a VPN is choosing whom to trust.

With Tor, no single party sees both who you are and what you're doing. The entry node knows your IP but not the destination; the exit node knows the destination but not your IP. That's the central design property.

2. How many hops

A VPN is one hop. Your traffic enters the tunnel and exits at the provider's IP. Latency overhead is small.

Tor is three hops by default. Each hop adds latency, often 100–300 ms each in the modern network. Total round-trip time is significantly higher than direct.

3. Speed

VPN speed is usually close to your normal speed once you connect to a nearby provider server. Streaming, calls, downloads — all generally fine.

Tor speed is much slower. Streaming HD video over Tor is impractical; even regular browsing feels meaningfully laggier. The compromise is intentional — speed buys you anonymity.

4. Threat models

VPN defends against your ISP, public Wi-Fi snoopers, and casual geographic restrictions. It does not anonymise you against the destination site, especially if you sign in to anything.

Tor defends against being identified by destinations and against any single party in the path. It's the right tool when the threat is "someone who can watch the network."

5. What you can reach

VPN reaches normal web destinations, possibly with the appearance of being in a different country.

Tor reaches normal websites and a separate set of .onion services that exist only inside the Tor network — a feature for sites that explicitly want to be anonymously hosted.

6. Real-world cost

VPNs are mostly paid. Free VPNs exist; the business model often involves looking at your traffic, which defeats the purpose. Reputable paid providers cost a few dollars a month.

Tor is free, run by volunteers. The cost is paid in latency, not money.

When to Choose Each

Choose VPN if:

  • Public Wi-Fi protection (so the airport network can't see your traffic).
  • Watching streaming content available in another country.
  • Hiding general browsing from your ISP without the heavy speed tax of Tor.
  • Remote workers connecting securely to a corporate network.

Choose Tor if:

  • Journalists, activists, or anyone who genuinely needs network-level anonymity.
  • Reaching .onion services that aren't available on the regular web.
  • Living under network censorship that can be circumvented through Tor bridges.
  • Researching sensitive topics where any single point of trust is too many.

Worked example

A traveller using free hotel Wi-Fi enables a VPN before signing in to webmail. The VPN keeps the hotel network from seeing the credentials and the email traffic — that's the right tool for that threat. Months later, the same person is reporting on a politically sensitive story; they switch to Tor for source-protection reasons. Different threat, different tool. Some setups even chain the two together (your traffic → VPN → Tor) for layered protection, though it adds friction and isn't necessary for most users.

Common Mistakes

  • "VPNs make me anonymous." They make you private from the network in front of you. Sites you sign in to still know who you are.
  • "Tor is illegal." Tor is legal in most countries. It's a tool; what people do with it can be legal or not.
  • "A free VPN is the same as a paid one." Many free VPNs sell user data or run ads on your traffic. The right comparison is to a paid VPN with audited policies.
  • "Tor is slow because it's broken." Tor is slow because every connection takes three hops by design. Slowness is a property, not a bug.