Differences between using Tor browser and VPN

TL;DR

Tor provides anonymous web browsing but does not provide security. VPN Services provides security (sort of) and anonymity, but the anonymity might be more in question depending on the service. Since you're depending on them not logging pieces of information that may or may not be able to be traced back to you.

VPNs

Traditional
A traditional Virtual Private Network does not extend your ISP. A VPN extends an existing private network across a public network. For example, let's say my company has a private network with email servers, web servers (intranet), and DNS setup for company related services. It's a private network for company employees only. However, some employees want to work from home. A VPN is set up so that employees can securely connect to the private network remotely. This provides two features:

  1. Authentication - Users present their credentials to gain access to the VPN
  2. Encryption - The entire tunnel between the remote user and the private network's gateway is encrypted.

Take that last statement: "The entire tunnel between the remote user and the private network's gateway is encrypted." Once you're through the gateway, communication is un-encrypted. Unless the services within the private network itself use another means of secure communication.

Keep in mind that no anonymity is provided by this setup. In fact, the company knows exactly what IPs are connecting to its private network.

VPN Services
Nowadays VPN seemingly takes on many meanings, and online/cloud/[insert Internet buzzword here] have complicated things. We see questions now, "Which VPN takes your anonymity seriously?" What has happened is that VPN Services have become a kind of "secure anonymity service". A service will provide secure communications to a proxy server that will then dump your communication out into the clear to whatever your destination.

This is kind of like what a traditional VPN does, except now the statement of "a VPN extends your ISP" is kinda true. Now you're just encrypting the first half of your communications. It extends in the sense that you can access websites and services you might not normally be able to due to your geographic location. But "extends" really isn't the right word to use.


Take ExpressVPN for example, it advertises the following:

  1. Encrypt your Internet traffic and hide your IP address from hackers and spies.
  2. Access any website or app without geographic restrictions or censorship.

Take out "Encrypt your Internet traffic" from the first statement, and you basically have an anonymous proxy. But now that the tunnel is encrypted it's a VPN to your anonymous proxy (gateway) that then forwards your traffic on, into the public Internet.

Tor Browser

Onion Routing

Onion routing was designed to provide complete anonymity to a connection. It accomplishes this with encryption. Three layers of encryption. When using the Tor Network a path is determined with a minimum of 3 nodes (can be more). Encryption keys are setup and exchanged between you and all three nodes. However, only you have all of the encryption keys. You encrypt your data with each of the nodes' keys starting with the last node's (exit node) and ending with the first (entry node). As your data moves through the network a layer of encryption is peeled off and forwarded to the next node.

As you can see the exit node decrypts the last layer, and forwards your data to its destination. Which means your data is in "plaintext"1 at this time, but complete anonymity is accomplished. With at least 3 nodes no node knows both the source and destination.

Anonymity not Security
Tor does not promise secure communications. Encryption is only used to provide anonymity between nodes, your data is not encrypted otherwise. This is why it is still highly encouraged to use HTTPS-enabled websites while using Tor. As @LieRyan mentioned in another thread's comment, sending personally identifiable information through Tor without using other security measures will break any anonymity that Tor provides.

Traffic Visibility

As far as traffic visibility if there is an admin on the network they will be able to see your traffic. Let's take a situation with a VPN: you have your remote laptop R and your private network gateway/secure anonymous proxy (G). Now you have a private network IP that is encrypted from R to G. A network admin sitting on G can see your plaintext1. As stated above if you are using another secure protocol like SSL/TLS through the VPN/VPN Service then the "plaintext" is really encrypted, and the network admin would not see anything but encrypted data.

So this really depends on where the network admin is sitting in the connection, and whether or not you use a secondary secure protocol underneath the VPN. This same logic applies to Tor. Because as I stated earlier encryption is only used for purposes of maintaining anonymity.

Both traditional VPNs and VPN services are to protect against external visibility into the network. Neither of them will protect you from authorized administrators for the network you're on. It's all about protecting your data from unauthorized eyes. Even with SSL/TLS, a website that you're visiting sees your decrypted traffic. It has to in order to process the request. Admins on that website can see those same requests and/or log them. It's the security protocols used initially and in between that make the biggest difference in the security of communication.


1 It's plaintext as far as the data that was sent is seen here. If the data is encrypted with something like SSL/TLS before going through the onion routing then the encrypted data would be seen at this point.


A VPN means your connections pass through one other server. The administrator of your network can't see anything but the fact that you're talking to that VPN server; the administrator of the computer you're ultimately connecting to generally can't see your real source address (though they can see that you're connecting from a given VPN service); but the VPN administrator can see everything (where you're coming from, where you're connecting to, what you're saying provided you're not using end-to-end encryption like TLS). That means that by going to the VPN provider, someone may be able to find out what you're doing.

This isn't just a hypothetical -- VPNs are often used by organizations so that people authorized to use their network can achieve comparable security on an unsecure network (this is the real point of them: protecting against you against the network you're physically connected to, not hiding your identity from the site you're trying to reach). These organizations may well cooperate with an investigation of an illegal use of their network (e.g. illegal filesharing), just like they might do so if you're actually on their network directly. They may have to cooperate with law enforcement conducting a criminal investigation. You're essentially trusting the VPN provider completely to hide your identity, as you would be trusting your network admin absent a VPN.

In contrast, the point of onion routing schemes like Tor is that there isn't a single server that knows who you are and who you're talking to. Each node knows where it got traffic from and where it sent that traffic, but that doesn't mean it knows where the ultimate source or ultimate destination is (only the entry node knows the original source [but it doesn't know it knows this], only the exit note knows the ultimate destination, and neither of them knows who the other one is, because they only talk through a third relay node). Because it's decentralized, there's no single point of failure who can identify you and what you're doing.


TOR

Tor, known as "The Onion Router", is an anonymization service. Tor makes it difficult to trace your online activities back to you and protects your privacy online. It basically works by routing your Internet traffic through their Tor network made of randomly selected relays which are actually run by volunteers from all around the world.

All the Internet traffic passing though the relays gets encrypted and re-encrypted multiple times until it gets to the exit node.

At the exit node, the last layer of encryption gets decrypted and the data is sent to the destination without exposing the sender's is.

VPN

In a nutshell a VPN service helps to protect your privacy with masking your IP address and encrypting Internet traffic. When connected to VPN server your traffic is encrypted in the VPN tunnel acting as a proxy for your desired website.

Since you're connecting via the VPN tunnel, the websites that you access can only see IP of the VPN server, not original IP of your device. Also since you're in an encrypted tunnel, no one, including hackers and your ISP, can snoop on your web activity or steal your sensitive information.

PROXY

When it comes to security, proxy provides low-level security unlike VPNs. Also most proxies are very slow and unreliable since they are usually free and are used by unlimited number of people. They mostly only used to bypass geographical restrictions, but provide minimal security and privacy. Checkout the VPN v Proxy Comparison link for more info.

Both Tor and Proxy are free, which is OK if you're not looking for great speeds and online security rather than simply anonymity.

With a VPN you have the following:

  • Connection speed is a lot faster through VPN tunnel compared to Tor and Proxy

  • Provides better privacy and security than Tor and Proxy

  • More reliable and stable connection.