Is Tor browser safe to use?

Last updated: December 8, 2022

Tor browser is the most secure option that you can get. Unlike any other browser, it offers unprecedented privacy and access to its .onion network.

Disclaimer: Affiliate links help us produce good content. Learn more.

Although Tor is a great tool against censorship, it is not flawless. Tor remains free and available to everyone at the cost of online safety. By design, their network of volunteer relays makes complete privacy impossible.

Fortunately, Tor isn’t the only privacy tool out there. A VPN, such as NordVPN, can be used instead of Tor or together with it, creating the ultimate tool to protect your privacy. That means not only browsing, but streaming, torrenting, and gaming as well.

Tor security issues

Below are some of the security issues you may be exposed to while browsing with Tor.

Want to make Tor more secure?
NordVPN integrates it into their VPN solution for maximum protection.

Unencrypted connection between the exit node and the destination server

One of the biggest issues related to Tor is that the connection between exit nodes and the destination server is unencrypted. Meanwhile, although the connection between your device and the entry node is encrypted, your IP address is not hidden.

An IP address can often be enough to narrow down your identity to a few individuals. That means that you will know who is doing what online if you combine the information from both the entry and exit node.

Powerful actors can easily abuse Tor for surveillance

It’s true that the entry and exit node is never the same person, and nodes don’t know the identity of other nodes. However, theoretically, nothing stops a resource-rich party from controlling a large chunk of the network, increasing the chances of having both the entry and exit node data.

For example, there have long been rumors about governments running Tor nodes, allowing bulk data collection.

This isn’t the only concern when it comes to powerful actors exploiting Tor. For example, in 2017, security researchers from Hacker House showed that it was possible to deanonymize Tor users by tricking them into opening a Windows DRM-protected file.

While this sort of attack would be too expensive for run-of-the-mill hackers, well-funded actors such as governments would be more than capable of carrying it out.

inspection of features

How to make Tor Browser safe to use

Tor is awesome if you use it correctly. To make it secure:

Use a VPN with Tor Browser. Choosing a reliable VPN is one of the best ways to add an extra layer of security and privacy. It effectively solves every security issue Tor has – namely, encryption and your IP being known to the entry node.

In short, using Tor together with a great service like NordVPN grants a very high level of online security and privacy.

Fine-tune your Operational Security. Many experts see OpSec as a significant vulnerability for Tor users. By this, we mean ensuring that key identifying information such as payment details, IP addresses, MAC addresses, and your OS are shielded and not transmitted at any point. And it also means making extra sure that your passwords are fit for purpose.

Get pluggable transports and bridges. When you start browsing with Tor, your ISP or the government cannot tell what you’re doing but it knows you’ve connected. Thus, it can effectively block access, unless you use one of the three pluggable transports. If that doesn’t help, we recommend using private relays, also known as bridges. That comes with a price of reduced performance, though.

Resist the urge to stock up on extensions. The Firefox-based Tor browser can become vulnerable due to toxic add-ons. This includes free VPNs like Hola or rating apps like Web of Trust. So try to keep your browser setup as clean as possible.

anonymus man

NordVPN: the service with native Tor integration

NordVPN is quite possibly the most secure VPN out there and even has an in-built Tor integration – Onion over VPN. This service offers military-grade AES-256 encryption, a kill switch, and no leaks. It operates out of Panama – a privacy-friendly country, allowing NordVPN to have a strict no-logging policy.

Perhaps most importantly, NordVPN is the fastest VPN service on the market today. That’s relevant because Tor impact speeds quite heavily, so you’ll want a fast VPN to combine it with.

VPNpro rating: 9.6 / 10

Tor vs VPN: do we have a winner?

While you can achieve the highest degree of security by combining Tor and VPN, you can use both individually. The Tor vs VPN discussion has many talking points, but here are some of the main ones.

Tor vs VPN video review

Tor vs VPN | 2 tools - 1 purpose? Are you sure??


Tor protects what the user is doing while inside the Tor browser and not activities outside it. On the flip side, a VPN service protects all of the user’s online activities, including the web browser and other apps.

Top VPN providers are great for your online security. The success of their business depends on patching out any vulnerabilities quickly and effectively.  Tools like NordVPN have advanced features good enough for hackers or political activists in countries like China.

Nevertheless, while top VPNs are much more secure, they act as a hub for your data. Meanwhile, Tor disperses your data across volunteer relays. However, in practice, no-log VPNs carry little of your data, whereas the Tor relay network also has vulnerabilities.


VPNs generally have much faster connections.

Tor was not built with connection speed in mind. Your connection goes through a series of volunteer relays instead of the hard-metal servers of VPN providers. These relays are often much less capable of dealing with a lot of traffic than VPN servers.

Furthermore, routing with Tor is random and much less efficient. Typically, your connection goes through several relays, which is always a detriment to performance. With VPNs, you can choose which servers you connect to, resulting in more control and better speeds.

To illustrate, we performed some speed tests. The server chosen by the online speed test when using Tor is in Accra, meaning our Tor connection is going through somewhere in that area (a good illustration of random and inefficient routing):

tor speedtest accra

Here is the speed test using NordVPN. For fairness, we connected through a VPN server in Germany and chose the same speed test server in Accra:

NordVPN speedtest in Accra

As you can see, NordVPN is superior to Tor according to every metric: ping, download speed, and upload speed.


Tor is available on Windows, macOS, Linux, and Android. You won’t be able to run it on iOS or any other platforms.

Support for devices varies from one VPN to another. For example, NordVPN has custom apps for Windows, macOS, Linux, iOS, Android, Android TV. They also offer add-ons for Chrome and Firefox, which is irrelevant for this comparison. However, NordVPN also supports a host of other device types, such as routers, smart TVs, etc.

Streaming, torrenting, and gaming

Tor is essentially good for one purpose: browsing (censored websites).

VPNs are much more versatile. You can use them for:

  • Streaming. VPNs can help you bypass geo-blocking and unlock platforms like Netflix, BBC iPlayer, HBO, Hulu, and much more
  • Torrenting. Downloading copyrighted content can get you into trouble – VPNs can hide your identity. The good ones are also fast enough to make torrenting convenient
  • Gaming. VPNs can be used to improve your ping (in some cases), and they can also unlock services like Nvidia Shield or Steam


This is where Tor takes the edge over VPN: Tor is completely free.

VPNs come in free versions and paid versions, but the free ones have all sorts of issues. The best VPN services can cost anywhere from $1.00-$15.00/month (with higher prices for shorter subscriptions).


There are limits to the safety of the Tor Browser. While it is certainly great as a free tool, the technical characteristics of Tor mean it can never be completely secure.

The safest way to use Tor is together with a good VPN service (check our Best VPN for Tor list). However, it is also safer to use a VPN instead of Tor (assuming you choose a secure provider).

You may also like to read:
Best VPN for crypto trading
Roobet VPN
How to make Tor faster
Best VPN for Stake
Most secure VPN protocols
Best VPN for Firefox


Is Tor really safe?

The short answer is yes, it is. However, everything depends on what you’re planning to do with it. If you start visiting the dark web, the risk increases automatically. Don’t forget your safety slider and put it on “High” whenever you do something risky.

Is it enough to use Tor for safety?

No, it’s not enough. You can still get your device infected, so getting an antivirus before this happens is a rule of thumb. Moreover, a VPN is also a good idea for added protection. After all, it would be best if you stay safe outside of Tor too.

What's better – Tor or VPN?

That’s a question with multiple answers. First off, these are two different tools with different purposes. If you could have only one, pick a VPN because it’s universal and encrypts all of your traffic. But the best solution is to use Tor and VPN together.

Is Tor browser free?

Yes, the Tor browser is free. The whole Tor service is free as well, and servers are run by volunteers.

Does Tor browser have a mobile version?

Yes. Currently, Tor browser is available on Windows, macOS, Linux, and Android. There’s no option for iOS, but users can still download the Onion browser app. It acts quite similarly to the original.

Tor browser is slow – what can I do?

Unfortunately, there’s not much you can do to speed up Tor because multiple servers from all over the world handle your data. Furthermore, there are only about 7,000 of them, which is clearly not enough for the increasing userbase.

Are there other networks like Tor?

Yes, there are. Two of the most well-known are the Invisible Internet Project and Freenet. However, you won’t have access to .onion websites while using them.


  • Exceptional privacy
  • Feature-rich
  • Access to .onion websites
  • Based on relay network


  • Slows down browsing
  • Not user-friendly
 9.6 / 10
Total score
$0.00 / month
Minimum Price
Leave a Reply

Your email address will not be published.

  1. Radalio Shem

    What do you mean tor doesn’t hide an IP address? It most definitely does. The exit node decrypts the tor specific encryption (meaning it can see the https encryption) but the data isn’t associated with a user. It being an open source project means it’s peer-reviewed by a much large number of experts than any company can hope to hire. Also, tor is more private than a vpn because the tor project can’t see user specific data, where a vpn can and just promises not to look.

    1. avatar
      Ethan Payne Author

      Hello, Radalio. I doubt that just because a project is open-source that it get peer-reviewed by a significantly larger number of experts. It’s mostly volunteers with some free time on their hands. Meanwhile, VPN companies hire and pay experts for their full attention and dedication to the project. Plus, most VPNs are built specifically that no data would be stored and they could not see anything even if they tried.

      1. NslashA

        So how can you explain the case of GNU/Linux? It’s an open-source project that is much more secure than Windows or MacOS.

        1. avatar
          Ethan Payne Author

          Hi, NslashA. Well, GNU/Linux is still used by a minority. As such, it’s not worth the effort for exploiters and hackers to target Linux users, especially considering that Linux users are pretty tech-savvy and unlikely to fall for scams or download malicious files. Meanwhile, Windows and Mac are widely used operating systems by various users with different levels of knowledge. That means that targeting them gives hackers more chances of success.

          1. Nutella

            Most devices run on linux. Think of smartphones, servers and even IoT these days. Hackers have HUGE incentives for breaking into *nux systems.

          2. avatar
            Ethan Payne Author

            I’m primarily talking about desktop machines. Plus, the devices you mentioned, such as IoT and server hardware, are using different versions of Linux and thus might need specific hacking methods. 

      2. Anonymous

        Many VPN leaks show that lots of VPN companies are actually collecting data even if they said they don’t. There’s nothing making sure that those companies don’t collect data, unless their softwares are open source.

        1. avatar
          Ethan Payne Author

          Greetings, anonymous. Independent audits can ensure that VPN providers aren’t collecting logs. And it’s true that most VPNs collect some data, but only as much as is needed to provide the essential service. For example, the number of connections needs to be tracked to ensure that an account can only have as many simultaneous connections as is permitted.

  2. Jeff Beck

    Whether using Tor or VPN doesn’t make any difference when it comes to encryption between the exit node/VPN server and the destination server.

  3. eureka000

    I have used it once but I do not feel comfortable. Probably because I am used to the normal traditional browsers. However, I think using a VPN gets me covered so I don’t really dig deep into Tor so far

  4. Jacob B

    I have got this concern about Tor. This is it guys, my perception on Tor has been that it’s only designed for use on Dark web. Nah!! I got it all wrong. Tor will actually allow you to surf the internet privately and secured

  5. Mark

    why does it say that Tor should be used with a VPN ? While others say Tor should just be used on its own ? Confused !


    1. avatar
      Mikaela Bray

      Hi Mark,
      Using Tor on its own is fine in most cases, however, as a freeware project it does have some vulnerabilities. Using Tor with VPN fixes these vulnerabilities.

      1. NslashA

        Dear Mikaela,
        Using a VPN with Tor compromises your anonymity. VPN also does not do anything to fix what you called “vulnerabilities.” A VPN does not protect your anonymity at all. It just forwards your connections through a centralized, single point of failure VPN server which we don’t know how data is processed. Never trust VPN companies as they can always lie about their data policy because their softwares on both client and server side are closed source. A VPN server will know both where you’re from and where you’re connecting to. It also does not encrypt data which is being transmitted from the VPN server to the destination website. If you want your data to be end-to-end encrypted, you can just use HTTPS which is available on most common website.

        1. avatar
          Mikaela Bray

          Hello NslashA. Thank you for your feedback. Could you elaborate on how a VPN with Tor compromises security? I agree that some VPNs aren’t trustworthy, but other providers go through independent audits and even have open-source software. For example, ProtonVPN. Plus, a VPN hides the fact that you’re visiting the Tor network from your ISP. Without a VPN, your ISP will know that you’re using the Tor Browser.

          1. NslashA

            a) When you use a VPN with Tor the VPN provider will know who you are (because they know your IP) and the fact that you uses Tor. Also most VPN apps are proprietary software, so they can track the activities you are doing in and out of Tor Browser.
            b) You are just mentioning a single VPN
            c) You can just use a Tor bridge if you don’t want your ISP to know you’re connecting to Tor.

          2. avatar
            Mikaela Bray

            Thanks for the reply. I agree with your point about using a VPN with Tor but everything comes down to trusting your service. If we say that you cannot trust VPNs, there’s not much point in talking about their security and privacy features.

            And while using a bridge is great (we added a paragraph on this, thanks), our main argument is that Tor protects browser traffic only.

            We did mention one VPN only, mainly because there aren’t many options with Tor over VPN that we like. Also, for some articles we do the Top 5 or Top 10 list, for others we stick to the best service. Finally, we do have a link to the best VPN for Tor article.

      2. Anonymous

        While your point is completely correct, but you are just mentioning a single VPN service, that reduces your credibility. Writing

  6. Gavu29

    While I’m pretty sure the Government has their claws in Tor somehow, this is still better than using regular browsers. I think that using a VPN and Tor could offer the ultimate level of protection online or as close to it as we’re going to get at this time.

  7. Ben C

    I use Tor. Its a great browser that protects your online security and tends to show you websites trying access your data and same time blocking them
    The downside of it is that, you’ll have to be filling too many annoying recaptchas on some websites..But in all its great and should be one of the browsers you should have in your PC

  8. avatar
    Mikaela Bray

    No, they’re not similar at all. Incognito mode simply means that the browser won’t save your browsing history, cookies, or form data. But your ISP, employers, etc. would still be able to view your browsing behavior if they wanted to.

    Tor is more about encrypting your data and bouncing it around different relays so that it’s very, very difficult for anyone to know what you’re doing — rather, to trace your browsing behavior back to you.

    Hope that helped answer your questions!

  9. Kenneth Unger

    Is this similar to the incognito window offered by most browsers so users can browse privately?

    1. Smart Guy

      No cuz incognite mdoe only hides info from others on your pc, your ISP can see whatever you do either way, but with a vpn, they can’t and if you use tor and a vpn it gives you the best result.

      1. fuckvpn

        just use https everywhere

Table of Contents:
Thanks for your opinion!
Your comment will be checked for spam and approved as soon as possible.