Oddbean new post about | logout
 Clearnet vs VPN vs Tor

A quick overview
#privacy #tor #vpn 


Computer -> clearnet -> Website 

ISP: sees that you are connected to website
VPN: n/a
Tor Entrance Node: n/a
Tor Exit Node: n/a
Website: sees your IP address and logs everything that you do on the website 

Good for when the expectation of privacy does not exist. A KYC site you are logging into. Utility bill pay site, bank 


Computer -> VPN -> Website 

ISP: sees that you are connecting to a VPN but not what you are doing afterwards 
VPN: sees your IP Address and that you are connecting to a website 
Tor Entrance Node: n/a
Tor Exit Node: n/a
Website: sees that someone from a VPN exit node has connected but doesn’t know who. Logs data. 


Good for hiding your activity from your ISP. Good for hiding your identity from the website. Good for when you want low level privacy but not anonymity. VPN provider sees everything and your level of privacy depends on how much they know about you and how much data they log and retain (varies greatly from provider to provider). 


Computer -> Tor -> Website 

ISP: sees that you are connected to Tor but nothing afterwards 
VPN: n/a
Tor Entrance Node: sees your IP address but nothing afterwards 
Tor Exit Node: sees website you are going to but not who you are 
Website: sees someone from Tor has connected but doesn’t know who. Logs. 

Good for privacy and anonymity. Assumes that Tor is legal in your country. 


Computer -> VPN -> Tor -> Website 

ISP: sees that you connected to a VPN but nothing afterwards 
VPN: sees IP address and that you are connecting to Tor but nothing afterwards 
Tor Entrance Node: sees a VPN is connected but nothing afterwards 
Tor Exit Node: sees website you are going to but not who you are 
Website: sees someone from Tor has connected but doesn’t know who. Logs. 

Good for if your ISP blocks or cancels your service for using Tor. Potentially an option if Tor is illegal in your country (Dangerous). 


Computer -> Tor -> VPN -> Website 

ISP: sees that you are connecting to Tor but nothing afterwards 
VPN: sees someone from Tor is connected and that they are connecting to a website 
Tor Entrance Node: sees IP address but nothing afterwards 
Tor Exit Node: sees someone is connecting to a VPN but nothing afterwards 
Website: sees someone from a VPN is connecting but doesn’t know who. Logs. 

Good for when a website blocks Tor traffic. Assumes Tor is legal in your country. Assumes that the VPN doesn’t know who you are. To maximize privacy and anonymity VPN provider should be KYC free and accept privacy payments (ex: Monero). 


Note: If a website blocks Tor and VPN then maybe that is a sign that you shouldn’t go there. 
 nothing is fully anonymous in any 3 of above 
 There is no absolute #anonymity on the #internet, but you can aim to be too expensive to track routinely.

That's the same offline too. You can track someone in London fairly cheaply, but once you get out in the #Welsh hills its going to cost a small #fortune.

#tracking #privacy 
 If only Tor and Apple would be friends… 
 You can use Orbot for ISO mobile 
 I was using it but it quit working. Last time I checked, I didn’t think it was being supported any longer. Has something changed? 
 Looking at the Orbot app, looks like maybe they’ve make some changes. At one point, it was unusable for me. May give it another try. 

How does this work if I’m using Mullvad VPN? Can I use both at the same time? If not, which would be better to use? 
 Not if you are on iPhone. The iPhone will only allow one at a time. If you are on Mullvad, Orbot will kick you off. 

Depends on what you are doing 
 Nice write-up. Tor over VPN is generally recommended if you want to hide Tor usage from your ISP and access the dark web securely, while VPN over Tor might be better if you prioritize privacy and want to shield your IP from the VPN provider.

**HOWEVER, IT IS IMPORTANT TO NOTE THAT:**

**VPN over Tor (Computer -> Tor -> VPN -> Website) is more complicated due to the need for precise configuration and the potential for DNS leaks, whereas Tor over VPN is simpler and generally more supported by VPN providers.**

**So proceed with caution. You could shoot yourself in the foot if you don't know what you're doing and you don't test it well.**

**VPN over Tor:**

1. **Configuration Complexity:**
- Requires setting up the VPN client to connect after the Tor network is established.

- Ensuring that the VPN client is properly configured to route through Tor can be tricky.

2. **Limited VPN Support:**
-Not all VPN providers support connections through Tor, limiting the choice of VPN services.

3. **DNS Leaks:**
-More prone to DNS leaks if not properly configured, which can expose browsing activity.

4. **Performance:**
- Usually slower because the traffic first goes through the Tor network and then through the VPN, adding latency.

5. **Anonymity:**
- Tor entry nodes can see your IP address, but the VPN exit node sees the final destination. Misconfiguration can expose your identity.

---

**Tor over VPN:**

1. **Simpler Setup:**
- Connect to the VPN first, then start the Tor browser. Most VPNs support this configuration.

2. **Privacy:**
- The VPN hides your IP from the Tor entry node, adding an extra layer of privacy.

3. **DNS Handling:**
- Easier to manage DNS settings, reducing the risk of leaks.

4. **Compatibility:**
- More VPN providers support this setup, making it easier to find a suitable service. 
 Good points. Also all of this is pointless if you are using a OS or browser that tracks you. Or do something dumb like forget to log out of a google account. 
 💯 Gotta be vigilant with good OPSEC. 
 100%. All the more reason to have separate VMs for different purposes or Qubes OS where that is already baked in. 
 What is an example of a specific risk of your ISP knowing you accessed Tor? 
 Them canceling your service if it is against their terms and conditions. They dime you out to the government if tor is illegal where you reside. 
 Ah yeah that first one feels most likely to occur 😅 BRB going to skim my ISP’s T&Cs 
 Guantanamo 
 Thanks for writing up! Much appreciated 
 I suppose having a very long range wifi antenna and borrowing a distant wifi network and using the VPN & TOR techniques above along with Qubes/Whonix would help even more.  Or a public wifi. 
 Anything that would distance yourself from identity. Public WiFi has its own issues even if it’s not an evil twin. 
 Wifi & Bluetooth frequencies are poisonous for your brain  
 VPN at the router. Always. 
 💯 
 >
2. Privacy:
- The VPN hides your IP from the Tor entry node, adding an extra layer of privacy.

-
The enttry node knows where you coming from even with vpn ... entry node is always showing the same country, the country which you are in 

 
 Safer to keep always on VPN active than to risk accidentally not reenabling it and exposing your IP 
 Thanks for the killer write up for a novice. Cheers man 
 TOR has a mode that looks like regular web traffic.  It is possible to use only TOR without your ISP or government noticing.