VPN vs Tor vs Proxy: What Actually Protects Your Privacy
VPNs, Tor, and proxies all claim to protect your privacy online. They work very differently. Here's what each actually does and when to use it.
If you’ve spent any time researching online privacy, you’ve hit the same three options over and over: VPN, Tor, proxy. They’re often mentioned interchangeably, but they do different things, protect against different threats, and are appropriate in very different situations.
Let’s break down what each actually does, and what that means for your privacy.
The Core Problem They’re Solving
When you connect to a website, several parties can see what you’re doing: your ISP, the network you’re on, any middlemen between you and the destination, and the destination itself.
VPNs, Tor, and proxies all try to reduce how much information those parties see. But they take different approaches, and each has tradeoffs.
How a VPN Works
A VPN creates an encrypted tunnel between your device and a VPN server. All your traffic runs through that tunnel. From your ISP’s perspective, you’re just sending encrypted data to one IP address. From the destination website’s perspective, you’re connecting from the VPN server’s IP, not your own.
What a VPN protects you from:
- Your ISP seeing which sites you visit
- A local network (coffee shop, work, hotel Wi-Fi) snooping on your traffic
- Websites seeing your real IP address and approximate location
What a VPN does NOT protect you from:
- The VPN provider itself. Your traffic is encrypted from your ISP, but it’s decrypted at the VPN server. The provider can log everything you do if they want to. This is why “no-log” claims matter, and why jurisdiction matters.
- Fingerprinting. Websites can track you via browser fingerprint, cookies, and logged-in accounts regardless of your IP.
- You being identified if you log in to accounts associated with your real identity.
A VPN shifts trust. You’re trusting the VPN provider instead of your ISP. Whether that’s an improvement depends on who you trust less.
For most people, a reputable VPN with a verified no-log policy (NordVPN and ProtonVPN have both published third-party audits) is a meaningful improvement over raw ISP visibility. It’s particularly useful if you’re on untrusted networks frequently.
How Tor Works
Tor is fundamentally different from a VPN. Instead of routing your traffic through one server you trust, it routes your traffic through three volunteer-run relays chosen at random. Each relay only knows the previous and next hop in the chain. No single node knows both who you are and what you’re connecting to.
This is onion routing: your traffic is encrypted in multiple layers. The entry node sees your IP but not the destination. The exit node sees the destination but not your IP. The middle relay knows neither.
What Tor protects you from:
- Network-level surveillance. Even your ISP only sees that you’re using Tor, not what you’re doing on it.
- The exit node knowing who you are (though it can see your traffic if unencrypted).
- Correlation of your identity with your browsing, assuming you don’t log in to accounts associated with you.
What Tor does NOT protect you from:
- Global adversaries watching both the Tor entry and exit nodes, who can potentially do traffic correlation.
- You logging in to an account associated with your real identity.
- Malware on your device.
- The significant speed penalty. Tor is slow. It’s not practical for streaming or regular browsing.
Tor is the right tool when you need strong anonymity and can accept slow speeds: journalists communicating with sources, whistleblowers, people in high-surveillance environments.
How a Proxy Works
A proxy is the simplest of the three. It’s an intermediary server that fetches content on your behalf. When you use a proxy, the destination sees the proxy’s IP, not yours.
Unlike a VPN, most proxies don’t encrypt traffic between you and the proxy. They’re primarily IP-masking tools, not privacy tools.
What proxies are useful for:
- Getting around geo-restrictions on content (they’re often used for this).
- Basic IP masking in low-stakes situations.
What proxies are bad at:
- Privacy. Without encryption, anyone on the path between you and the proxy can see your traffic.
- Trust. Many free proxies log traffic, inject ads, or worse.
- Security. A malicious proxy can intercept everything.
For most privacy use cases, proxies are the weakest option. They made more sense before VPNs became cheap and easy. Today, a proxy is typically only useful when a full VPN isn’t available or you just need to access geo-blocked content quickly.
Choosing Between Them
The right tool depends on your threat model.
For everyday privacy from your ISP and advertisers: A good VPN is the right choice. It’s practical, fast, and meaningfully reduces tracking. Look for providers with audited no-log policies.
For accessing content from another country: VPN or proxy both work. VPN is safer. Many free proxies are actively hostile.
For high-stakes anonymity: Tor. If you’re a journalist, activist, or anyone whose identity genuinely needs to be separated from their online activity, Tor is the appropriate tool. Accept the tradeoffs.
For combining both: Running a VPN into Tor (or Tor into a VPN) adds layers but also complexity and attack surface. Most people don’t need this.
The thing that protects your privacy more than any of these tools is behavioral discipline: not logging in to personal accounts while trying to be anonymous, not reusing identifiers, being thoughtful about what you share. The tools give you the infrastructure. The habits determine whether it works.
Related
ProtonVPN vs Mullvad: The Anonymous VPN Comparison
ProtonVPN and Mullvad are the two most privacy-serious VPN providers. Here's how they differ on anonymity, audits, payment, and jurisdiction.
Signal vs Session vs Briar: Which Messenger Can't Be Traced
Signal, Session, and Briar each offer strong privacy but with very different threat models. Here's which one to use depending on what you actually need.
The Minimal Privacy Stack for 2026
Four tools that handle the most common privacy risks without turning your digital life into a burden. Start here before adding anything else.