

So why use a tool that requires the user’s trust, when she can use a tool that doesn’t? Using a VPN, she has to completely trust her VPN provider. Using only Tor, she doesn’t have to trust any single entity. Are they completely trusted by their users? Yes, whether the users realize the amount of trust they are placing in the provider or not.Īssume for just a moment that using only Tor gives Alice the same about of “protection” as using only a VPN. Should VPN-provider-X be completely trusted? Maybe.

to be competent at keeping their network and machines secure.to not share information with their adversary.As long as the right ones aren’t compromised, working together, or otherwise malicious, the user stays protected. Users don’t have to trust every Tor relay that they use in order to stay safe with Tor. A VPN is fully, 100%, a single point/entity that you must trust. With Tor, you do not have to trust any single entity or any single point.
