To VPN or NOT?

  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in:

    This forum does not automatically send notices of new content. So if, for example, you would like to be notified by mail when Steve posts an update to his blog (or of any other specific activity anywhere else), you need to tell the system what to “Watch” for you. Please checkout the “Tips & Tricks” page for details about that... and other tips!

  • Larger Font Styles

    Just a quick heads-up that I've implemented larger font variants of our forum's light and dark page styles. You can select the style of your choice by scrolling to the footer of any page here. This might be more comfortable (it is for me) for those with high-resolution displays where the standard fonts, while permitting a lot of text to fit on the screen, might be uncomfortably small.

    (You can permanently dismiss this notification with the “X” at the upper right.)



Well-known member
Nov 1, 2020
VPN vs. Tor is interesting. Both encrypt data before it leaves your computer. Simply put:

A VPN provider can see most of what you do online, just as an ISP can when not using a VPN. So trust is shifted. But, you can shop around and try to find a trustworthy VPN provider. Here in the US, thanks to the corruption in our government, most people have no choice when it comes to ISP.

Tor tries to get rid of the need to trust a VPN provider. Like a VPN, Tor sits between you and the ultimate destination of your data. Tor involves three randomly connected computers (out of a pool of thousands), the one you connect to (Tor entry node), a middle one and the third one (Tor exit node) which does the final decryption and sends your data out to the Internet in the same form it would have been without Tor. The Tor entry node knows who you are (from your IP address) and the Tor exit node knows where your data is really going, but no Tor computer knows both. The down side (other than speed) is that you can not shop around for a trustworthy Tor exit node. It is reasonable to assume that spy agencies run some of them.


Well-known member
Sep 16, 2020
Ontario, Canada
Tor *could* work like a VPN, but it relies on you placing too much trust of the exit node. Accordingly you probably still want to use HTTPS traffic over Tor and be extra cautious and suspicious.

Anyone can operate a Tor exit node... including such undesirable people as Russian or Chinese or North Korean hackers, the NSA (or equivalent TLAs from other countries) or just ne'er-do-well malware toting hackers. They could theoretically alter your content on exit (to include maliciousness) or they can add content to your inbound download. Say you thought you were downloading a safe .EXE and they replace it (man in the middle style) with something that attacks you.