How Safe is Tor browser

Is Tor Browser Safe?

Last updated on July 7, 2021 Comments: 2

With the growing and ever increasing use of the internet to add efficiencies to our lives, there is also the growing chance that the sensitive data that we transmit online can fall into dangerous hands. One of the ways that many people get around this problem is to employ the use of Tor or the Onion Router which can be used to stop hackers or prying eyes keeping tabs on your online activity.

Tor is a perfectly safe option when it comes to maintaining anonymity online, and it also has its own Firefox based browser bundle, which is simple to download and set up. While Tor is a safe download, you should always make sure that you are downloading directly from the tor website and that it is the right download meant for you.

It works by passing your data or traffic through its system of servers so that it is hard to track where that data comes for. It therefore makes you very hard to trace.

However, in recent years, Tor and its abilities have been questioned. Many users have wondered whether Tor actually leaves them just as vulnerable as they would be if they didn’t use the software. In this guide to whether users are indeed vulnerable using Tor, we look at the software’s uses or benefits and ways to improve safety and online security if Tor does leave users open to online attack.

In this article

What is Tor Browser and How Does it Work?

The Onion Router—Tor for short—a well-known privacy solutions service, released its own internet browser in November 2017. Tor was originally created by the US Navy as a high-level security network.

Tor is based on decentralized networks, dispersing user data across nodes rather than on an individual location. This gives users anonymity by masking the source of their traffic as well as the route their information travels. However, even the safest networks have vulnerabilities, and Tor browser has been no exception.

Why Do People Use Tor?

As briefly alluded to, Tor is an added level of protection for users when they are surfing the web. It provides a safe place for folks to browse the world wide web and in countries where the internet is heavily censored, it is an easy (and free) alternative.

For example, in a country like Iran where there are hundreds of blocked domains, citizens must look to take some extra precaution for fear of getting caught violating the law. They use apps like Tor to secure their connection and ensure their browsing activity is untraceable.

Journalists and political activists also use Tor as they try to be careful reporting news while keeping their sources safe. Local ISPs can catch wind of their location and report them to officials, so an anonymous option is a great step towards security.

Tor has a goal to provide internet freedom to everyone and so in countries where domains are blocked, it is more popular as folks are seeking a safe service and ease of use.

Due to this ease of access, anyone can use it. Oddly, this is actually a drawback to the application. It has made Tor popular among users of the Dark Web. In fact, Tor has been used by organized crime leaders and shady characters who are specifically hiding their illegal activity from the authorities.

You may also run into the people who want to steal personal information, so be aware of the type of characters you will be connected to on the servers.

The Disadvantages of Using TOR

Even while Tor is a great step towards secure internet browsing, it is not your most protected option. There are a few drawbacks to using the application and it’s worth paying attention to them so you can understand how vulnerable you might be. Though Tor is a reliable service that has been trusted for years, it is still good to take a look at these drawbacks so you’re not oblivious to your risks.

It won’t protect anonymity 100% of the time. Sometimes you may find that you can hide behind the relays of the Tor network but if you are on the radar of your ISPs or if someone has access to your home Wi-Fi network, you may not be completely anonymous.

Even if Tor promises anonymity, you still have to understand that your traffic can be monitored. If not by government officials, then by someone looking to be malicious with your sensitive information, who is willing to connect the dots and ultimately find you.

Its encryption methods are not robust. Your usernames and passwords are not encrypted to everyone involved in the relay. The computers set up in the relay are able to have access to your sensitive information. Tor advises users to use end-to-end encryption such as SSL for an extra shield for sensitive information.

Sluggish performance. While this won’t leave you anymore vulnerable than any other connection, it is worth bearing in mind before logging on to the app. Due to the fact that the Tor network hosts a large number of users and there are many layers to go through to remain protected, your internet will take more time than normal to load. You may spend more time getting through connections than enjoying browsing. In the case that you are a fan of torrenting or streaming geo blocked content, doing so via Tor will slow down the network – not only for you but for everyone on the network, so Tor discourages it.

So Am I Safe Using Tor?

The answer to this is not straightforward. Tor is designed to provide free anonymous internet to the folks looking to protect their privacy. Even while developers continue to make efforts to increase the security Tor network provides, there are times when authorities and ISPs catch on and monitor activity.

Sometimes, this is for good reason. For example, recently European authorities along with FBI agents cracked down on the dark web drug trade that used Tor. The agencies launched Operation Onymous where they arrested 17 users and seized hundreds of dark web domains. These domains were used to solicit the drug trade and authorities were using Tor to monitor them. Rumors swirled that there were inconsistencies and vulnerabilities in the Tor program but nothing was confirmed. Tor chucked it up to good policing and not a fault in their security but it certainly raised the question of their reliability.

This wasn’t the first case however. In the US when authorities connected 150 people to the illegal sale of drugs and paraphernalia on the dark web through Tor. Once again it was never confirmed how they came across the information but it was another stab at the software’s reputation.

That’s all very well, but what about the average user that simply has their own concerns about user privacy? What new solutions have emerged to help users defend themselves from snoops and data collectors?  Well, Tor certainly does add a level of security. This is because, while many ISPs are aware of the general entry and exit points most users on Tor access, they cannot track websites visited or what you’re sending and receiving. However, what ISPs can see is how much data you are using, and where you accessed the network.

With These Tor Vulnerabilities, Is Tor Safe?

In short, while Tor has excellent features that have been proven throughout the years to be useful, it’s important to remember that Tor will have moments where it will be flawed. Many times, you may think you have anonymity but you are still being monitored.

How Can I Enhance Tor’s Safety?

To completely protect yourself from prying eyes and snooping officials (ISPs and some governments are aware of the major entry and exit nodes for the network which allows them to monitor activity and block access, as well as keep tabs on individual users), you should add an extra layer of protection to Tor. It’s vital that users protect themselves in more ways than one, and combining Tor’s web browser with other security tools can be very advantageous.

An extra layer solidifies your secure connection and gives you a little bit of assurance to know that folks will have a harder time finding you and your personal information. Users who value their privacy online and want to avoid marketers, advertisers, and even authorities from having access to their online habits should always look for ways to secure their activities.

A VPN is perfect for your added protection as it can offer you secured connections to the internet and ensure that your information cannot be traced. A VPN, or virtual private network, is a group of servers on the internet that form a safe tunnel to access information online. In this tunnel, information is encrypted and geo protected. Adding a VPN to your Tor application is adding a massive padlock onto your personal information.

How To Use Tor With A VPN

There are two options to boost your security when using Tor. We describe them below.

  1. Tor-over-VPN

The first option is to connect to your VPN, and then route your traffic to the internet through Tor, encrypting your data before it gets rerouted. This adds a layer of encryption before anonymity.

Advantages of Using a Tor with a VPN

  • Hiding your Tor usage from your ISP. This is down to your VPN masking your IP address.
  • Easy to set up. All users need to do is activate their VPN before using Tor as they normally would. Plus VPNs are easy to configure and generally require minimal effort on a user’s part.
  • Tor is still accessible. Tor does not become redundant to use when employing a VPN too. This is because Tor’s hidden services and websites that end in .onion are only accessible through Tor itself. This is still possible through a VPN as Tor’s entry node will only see the IP address provided by your VPN so users are still granted access to Tor’s hidden services.

Disadvantages of Using Tor with a VPN

  • Information entering Tor is encrypted, but exit nodes remain unprotected. The result of this is that exit nodes are still tracked by ISPs so you could still be detected
  • Your exit node could be blocked. This means users could be left without the ability to connect to the internet.
  • Vulnerability if your VPN connection drops. Your data may still be exposed to an ISP looking at entry and exit nodes.

2. VPN-over-Tor

The second method of combining VPN and Tor is slightly more complex, as it involves connecting through Tor, and then encrypting your data as it passes through entry nodes and gets routed. This method is known as VPN over Tor.

Advantages of Layering a VPN over Tor

  • Your IP address is better protected. This is because it is anonymized through Tor, so ISPs can only see your exit node IP.
  • Gain protection from malicious exit nodes. Data is encrypted before accessing or leaving Tor’s network giving users greater protection. Though ISPs can see your traffic, they will not know what you are doing.
  • No risk of no internet connection. This method allows users to avoid blocked Tor exit nodes.
  • Enhances your ability to choose your server location. This is a great benefit as it allows users to augment their anonymity.
  • Access to all programs. All your traffic is filtered through Tor, even from programs that aren’t compatible.

Disadvantages of Layering a VPN over Tor

  • ISPs can still detect that you are connecting to the internet through Tor.
  • Users will be unable to access Tor’s hidden services and .onion sites.
  • VPNs act as fixed links in the routing chain. This means user traffic is easier to spot and you are vulnerable to attacks.

It’s important to choose the best VPN for Tor carefully so you can be sure your connection is secure.

Best VPN for Tor Browser in 2021

To identify the best VPNs for Tor, our team of tech experts puts each of the VPN services below to the test. We’ve weighed each VPN based on several components, including their level of encryption and protocols offered, speed, and ancillary security benefits. Finally, user reviews and accounts are also considered to obtain the fullest picture possible.

Here’s a list of the best VPNs for Tor:

#1 ExpressVPN

Tor users will appreciate the lengths ExpressVPN goes through to deliver upon its promise of security, including creating a .onion version of its website for those individuals seeking anonymity. Moreover, the company even accepts payments in cryptocurrencies like bitcoin, which is known for its encryption and security features. Apart from these characteristics, subscribers can also customize their security settings with four established protocols including the widely popular OpenVPN, SSTP, L2TP/IPsec, and PPTP, letting them add as much privacy and encryption as they choose. Moreover, ExpressVPN employs some of the most robust protection available, with an AES-256 encryption that utilizes SHA512 authentication. Overall, the VPN’s network displays outstanding traffic speeds, and comes accompanied by a 30-day money back policy if users discover it’s not the best fit for their browsing needs.

Visit ExpressVPN

For our full review on ExpressVPN click here.

#2 NordVPN

Users concerned about VPN providers keeping tabs on their activity will appreciate NordVPN’s stringent zero-log policy, which has been in place and successful until now. The company is also based in Panama, which is known for its user-friendly privacy laws. Subscribers can easily set up a Tor connection with NordVPN thanks to the company’s well-known OpenVPN protocol. This offers users a more secure connection as this type of configuration truly doubles up layers of security. While it falls behind somewhat on the speed front, it does provide customizability thanks to its IKEv2, IPsec, and OpenVPN configurations, which let users set their own privacy preferences. The company even hosts specific servers that are pre-configured to work with Onion over VPN. If customers are unhappy or not convinced of the service’s fit, NordVPN incorporates a 30-day money-back guarantee in their subscriptions.

Visit NordVPN

For our full review on NordVPN click here.

#3 Cyberghost

CyberGhost’s super-fast speeds, great features, and no-logging policy, make it another excellent choice for users looking for a VPN for TOR. It has over 1,000 servers available to customers, and each one differs in its speed. Cyberghost also has a strict zero-logs rule, which means that they never collect your private internet data, so it can never be sold to advertisers or handed over to authorities. The company encrypts all of your data using a military-strength AES 256-BIT encryption which uses a 2048-BIT RSA Key. Cyberghost charges only $2.90 a month if you sign up to their 2-year plan. A monthly plan will cost you $10.99, whereas a 6-month subscription costs $7.99, and a year subscription costs $4.99. Each plan you buy comes with a 60-day money-back guarantee.

Visit Cyberghost

For our full review on CyberGhost click here.

Can I Use Tor with a Free VPN?

A rather popular question is whether you can use a free VPN for Tor. While it is a possibility, it is not one we recommend you try. Though you will not have to pay for the service, there is no guarantee that the service is up to par, avoids logging activities of a VPN client, or that it even provides you with a worthy connection.

Moreover, many free VPNs are simply stripped-down versions of paid services, and will remove many of the features that make VPNs ideal solutions. In the end, if you’re seeking protection, a free VPN may be a good way to test a service, but a paid provider will deliver the best results.

The Bottom Line

Despite its wonderful uses as a privacy-enhancing tool, Tor isn’t perfect, and can still let ISPs know what you are up to when you’re online. However, when combined with a VPN, you can better cover all your bases, and limit what an ISP can find out by making yourself essentially invisible over the web.

If you are concerned about how much your ISP—and by extension advertisers, businesses, and even government agencies—know about your online habits, then finding ways to protect yourself is vital. Even with some minor flaws, Tor and VPN combinations offer users peace of mind and full privacy, an attribute that is increasingly hard to acquire online these days.

Being concerned with privacy whilst connected to the internet, is arguably the only way to be. This has become even more imperative recently as the US government has given ISPs the legal right to collect data. Staying safe online using Tor, a VPN or a combination of both will therefore keep users safe from having the following information collected on them:

  • Demographic data such as age, gender, geographic location and more
  • IP addresses and other identifying information
  • Records of visits to unencrypted sites (those that don’t start with HTTPS), along with domains of encrypted websites
  • How long you visit each website
  • Which device you are using

It’s important to keep in mind that this data collection isn’t illegal, though it impinges on users’ rights to privacy. However, ISPs have lobbied hard to be able to collect this data, as it means a treasure trove of revenues for marketers. Ultimately, Tor or a VPN will stop you being susceptible to such money making schemes while also keeping you safe.

Final Tips to Stay Safe Online: Our Ultimate Checklist

Even when using a VPN and Tor to cover your tracks online, there are ways hackers could still reach you. When browsing the web, regularly applying these tips can help protect you better:

  • Always be careful when browsing websites. Check URLs to ensure they are encrypted (HTTPS) before navigating to them.
  • When connecting to public networks, make sure you have a layer of security active on your computer or device such as a VPN.
  • Always delete your cookies and temporary files as they may include trackers or contain other malicious code.
  • If you can, pay with cryptocurrencies, or other anonymous payment methods that give you greater protection online.
  • Avoid visiting known suspicious sites.

Article comments

petrus claustriatricus says:

I think, the Tor-Browser is save.

Anon says:

Thanks for the article, but I think I will just stick with a VPN for now. No need to make everything even more complicated with Tor.