Skip to main content
Explainer

VPN vs proxy vs Tor

All three reroute your traffic through some intermediary so the destination site sees a different IP. From there they diverge sharply: who can see what, what's actually encrypted, and what the failure modes look like.

Quick comparison

VPNProxy (HTTP/SOCKS)Tor
Hides your IP from the destination
Encrypts all traffic between you and the exitHTTPS proxies yes; HTTP/SOCKS no✅ (three hops)
Encrypts DNSIf the VPN handles DNSRarelyBuilt-in
Hides your VPN/proxy use from your ISPVPN visible as VPN; data hiddenVisible if HTTP, hidden if HTTPSVisible as Tor unless bridged
Trust requiredThe VPN operatorThe proxy operatorNone (in theory) — distributed
Typical latency hit30–150 ms30–100 ms500 ms – several seconds
BandwidthNear line-rateNear line-rateThrottled, variable
App scopeSystem-widePer-app (usually)System-wide via Tor Browser or transparent proxy

VPN — Virtual Private Network

A VPN client builds an encrypted tunnel from your device to a server somewhere else. All your IP traffic — DNS, HTTPS, BitTorrent, video calls — gets wrapped and sent through that tunnel. The destination sees the VPN server's IP, not yours.

What it hides well: the content and destination of your traffic from your ISP and local network. What sites you visit, what apps you run, who you talk to.

What it doesn't hide: the fact that you're using a VPN (the connection to the VPN endpoint is a single visible TLS/UDP flow), your identity from the VPN operator itself, and anything you log into. Your bank still knows you're you.

Failure modes:

Proxy

A proxy is a server that relays traffic on your behalf. Variants:

What it hides: your IP from the destination. Optionally, traffic content if the proxy is HTTPS.

What it doesn't hide: typically DNS is handled outside the proxy, so your ISP still sees the lookups. Per-app config means you forget about it for some app and leak.

Tor

Tor is a volunteer-run network of ~7,000 relays. Your traffic enters at a "guard," bounces through a middle relay, and exits at a third — and each hop only knows its immediate neighbour. The destination sees the exit-node IP; the exit only knows the previous hop's IP. No single relay knows both who you are and where you're going.

Tor Browser bundles Firefox-Tor + sane anti-fingerprinting defaults. Don't roll your own: the second you use it like a regular browser, you've defeated most of the protection.

What it hides well: the link between you and the destination, from everyone — your ISP, the relays, the destination. As long as you don't log into anything, you're a stranger.

What it doesn't hide: the fact that you're using Tor (your ISP sees a TLS connection to a known Tor IP unless you use a "bridge"). Exit-node operators can see plain HTTP traffic. End-to-end TLS still matters.

Failure modes: traffic analysis if an adversary controls enough of the network or watches both ends. Bad exit nodes that MITM HTTP. User error (logging into a real account through Tor links the session back to you).

Which one for which job?

Whichever you pick: test for DNS leaks and WebRTC leaks after you set it up. The default failure mode for all three technologies is "it's running but silently bleeding your real IP."