Fexyn
Fexyn
All posts

VPN vs Tor vs proxy: what's the actual difference?

Fexyn Team··9 min read

The "VPN vs Tor vs proxy" question is one of the most-searched in the network-privacy space. Most content treats them as alternatives in a three-way race; they are different tools for different threat models.

This is the working comparison. What each actually does, what trust model each requires, when to use which, and where they combine usefully.

VPN

A virtual private network creates an encrypted tunnel from your device to a VPN provider's server. Your traffic enters the tunnel at your device, exits at the VPN server, and continues from there to its destination.

What you get:

  • All your traffic is encrypted between your device and the VPN exit
  • The destination sees the VPN exit IP, not your real IP
  • Your ISP sees encrypted traffic to a VPN provider, not destinations
  • One hop — fast, simple, low overhead

The trust model: you trust the VPN provider. They can see all your traffic in cleartext at the exit point (because they decrypted it before forwarding). A "no-logs" provider promises not to retain this; an audited one has had that promise verified.

Speed: typical 5-15% overhead compared to direct connection. WireGuard is faster, OpenVPN slower, VLESS Reality somewhere in between with TLS handshake overhead.

Cost: $2-15 per month for commercial VPN. Free options exist with various privacy tradeoffs.

When VPN is the right tool: privacy from your ISP, accessing geo-restricted content, public Wi-Fi protection, censorship circumvention (with the right protocol), most general-privacy use cases.

Tor

The Onion Router. Your traffic encrypts in three layers and routes through three relays in a chain — entry node, middle node, exit node. Each relay sees only one layer of the encryption: the entry knows your real IP but not your destination; the exit knows the destination but not your real IP; the middle knows neither.

What you get:

  • Strong network-layer anonymity: no single party can correlate your real IP with your destination
  • No trust required in any single party (the security comes from the multi-hop architecture)
  • Free, decentralised
  • Bridge support for use in censored networks

The trust model: distributed. You do not need to trust any single relay because the cryptographic structure prevents any single relay from knowing both your identity and your destination. The risks: traffic-correlation attacks against well-resourced adversaries who can monitor multiple Tor relays simultaneously, and exit-node operators who could see your unencrypted-to-final-destination traffic if you visit non-HTTPS sites.

Speed: very slow. 3-hop routing through volunteer-operated relays adds significant latency. Streaming video is generally not practical; web browsing is usable but noticeably slower than direct.

Cost: free. Tor is volunteer-funded and open-source.

When Tor is the right tool: maximum anonymity for sensitive activity (whistleblowing, dissident communication, journalism in hostile environments). When you specifically do not want any single party to know your identity-to-destination mapping. When the threat model includes nation-state actors with deep network visibility.

Proxy (HTTP / SOCKS)

A proxy is a server that forwards your traffic. HTTP proxy handles HTTP and HTTPS. SOCKS proxy handles arbitrary TCP traffic (HTTP, IRC, BitTorrent, etc.).

What you get:

  • Your traffic exits to the destination from the proxy's IP
  • Some proxies encrypt the connection to the proxy itself (HTTPS proxy, SOCKS5 over TLS); most do not
  • Per-application configuration (your browser uses the proxy; other applications continue to go direct unless individually configured)

The trust model: you trust the proxy operator. They see all your unencrypted traffic. Most free proxies log everything; some inject ads; some are operated as part of botnets.

Speed: fast (single hop, often unencrypted).

Cost: many free options of varying quality; commercial residential proxies cost $5-50/GB depending on provider.

When proxy is the right tool: simple geo-bypass for a single application (web browsing) on networks where speed matters more than encryption. Almost never the right tool for general privacy because most proxies do not encrypt and almost all log.

How they compare directly

Feature VPN Tor Proxy
Encryption All traffic All traffic in 3 layers Optional, often none
Routing Single hop to VPN 3-hop through relays Single hop to proxy
Speed Fast Slow Fast
Trust required One provider None (distributed) One operator (often less trustworthy)
Anonymity Pseudonymity (provider knows you) Strong network-layer anonymity None inherent
Cost $2-15/month Free Free or $5-50/GB
Bypass network filters Most VPN protocols blocked in heavy DPI; Reality survives Tor itself is blocked; bridges with obfs4 sometimes bypass Most simple network filters
App support All traffic from device Tor Browser; some apps via Orbot/SocksProxy Per-application
Streaming usable Yes No, generally too slow Sometimes
Public Wi-Fi protection Strong Strong but slow Weak (often unencrypted)

SOCKS5 proxy vs HTTP proxy specifically

Both forward traffic on your behalf. Differences:

HTTP proxy handles HTTP and HTTPS. The proxy understands HTTP-level concepts (URLs, headers). HTTP proxies sometimes inject content (ads, telemetry) into HTTP traffic; HTTPS traffic is opaque to them so they cannot modify it.

SOCKS5 proxy handles arbitrary TCP at lower level. The proxy does not understand HTTP; it just forwards bytes. Works with HTTP, BitTorrent, IRC, gaming traffic, anything TCP. Some SOCKS5 implementations also support UDP forwarding.

For most modern use cases (HTTPS web), the difference matters less than it used to. SOCKS5 is more flexible; HTTP is sometimes more common in corporate proxies.

Combining VPN and Tor

Two patterns. Different tradeoffs.

VPN over Tor. Connect to Tor first, then run VPN through Tor. Your VPN provider sees Tor exit node IP; the VPN provider does not know your real IP. Mostly relevant if you do not trust your VPN provider.

Tor over VPN. Connect to VPN first, then run Tor through VPN. Your VPN provider sees Tor entry node connection; Tor sees VPN exit IP. Slightly improves anonymity by hiding from your ISP that you are using Tor (your ISP just sees encrypted VPN traffic).

For most users, the simple choice — VPN OR Tor — is the right answer. Combining them adds complexity without proportional benefit unless the threat model specifically requires it.

The honest framework

For 99% of users, the answer is VPN. Privacy from ISP, geo-bypass, public Wi-Fi protection, basic censorship circumvention. Tor is overkill and slow; proxy is insufficient and untrustworthy.

For users with elevated threat models (whistleblowing, source protection, journalism in hostile environments, dissident activity in authoritarian states), Tor is the right tool. VPN is insufficient because the trust shifts to the provider; in some threat models, the VPN provider is itself adversarial.

For users who want a quick geo-bypass on one website without caring about encryption, a proxy works. For everything else, proxies are not the right tool.

When VPN is wrong

Worth being explicit:

  • High-stakes anonymity. Tor is stronger than any VPN. If you need plausible deniability against nation-state-level adversaries, no commercial VPN provides that.
  • When the VPN provider is itself the adversary. Some VPNs are operated by governments or commercial entities with bad data practices. Trust matters; trust verification matters more.
  • When jurisdiction matters more than the security model. A logging VPN in a privacy-friendly jurisdiction is less safe than a no-logs VPN in a Five-Eyes jurisdiction. The "non-Five-Eyes is safer" framing oversimplifies.

When Tor is wrong

Tor is not a general-purpose tool:

  • Streaming video. Tor's bandwidth budget cannot support 4K video; HD is sometimes possible but stuttering. Use a VPN for streaming.
  • Logged-in services. Tor's exit-node rotation means you appear from a different country every few minutes; many services flag this as account compromise.
  • Online banking. Banks aggressively block Tor traffic. Use a VPN with a stable home-country exit.
  • General performance-sensitive use. Gaming, video calls, large file transfers — Tor's overhead makes these impractical.

Frequently asked

Is Tor illegal?

Using Tor is legal in most countries. China, Iran, Russia, and a few other countries block or restrict Tor; using it in those jurisdictions may carry legal exposure but is generally not specifically criminalised for individual users.

Should I use Tor for everyday browsing?

No. Tor is too slow for general use and breaks many websites that rely on stable IPs. Use a VPN for everyday privacy; use Tor for specific high-stakes activity.

Can I use Tor with my VPN?

Yes, in either direction (VPN over Tor, Tor over VPN). Most users do not need this combination; specific threat models do.

Is a free VPN better than Tor?

Almost always no. Free VPNs typically have data-collection issues; Tor's distributed-trust model is structurally more secure for the privacy use case. The exceptions are reputable free tiers (ProtonVPN free, Cloudflare WARP) which are operationally legitimate but limited in features.

What about I2P?

I2P is another anonymity network, similar in spirit to Tor but with a different architectural model (garlic routing instead of onion routing, different trust model). Smaller user base; more focused on within-network communication. Most users who would benefit from anonymity tools are better served by Tor.

Where does Fexyn fit?

We are a VPN. We are not Tor. We are appropriate for the 99% use case (privacy from ISP, geo-bypass, public Wi-Fi, censorship circumvention with Reality protocol). For high-stakes anonymity beyond what any commercial VPN provides, use Tor.


Try Fexyn free for 7 days — VPN for the 99% case. VLESS Reality protocol guide for censorship-resistant VPN. For anonymity beyond what VPN provides, the Tor Project is the canonical resource.

Last reviewed 2026-05-09.

VPN vs Tor vs proxy: what's the actual difference? | Fexyn VPN