Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
VPN is straight-up cryptography – basically, a cryptographically-secure TCP/IP router or switch, implemented in software. It uses very fast cipher algorithms which add only a slight amount of overhead. The encrypted packets then travel "straight to the destination" in a (usually ...) UDP datagram stream.
TOR is "The Onion Router" – a system that is designed to "scatter" traffic throughout the internet to prevent it from being detected or intercepted. The price that it necessarily pays to do this is speed.
VPN is straight-up cryptography – basically, a cryptographically-secure TCP/IP router or switch, implemented in software. It uses very fast cipher algorithms which add only a slight amount of overhead. The encrypted packets then travel "straight to the destination" in a (usually ...) UDP datagram stream.
TOR is "The Onion Router" – a system that is designed to "scatter" traffic throughout the internet to prevent it from being detected or intercepted. The price that it necessarily pays to do this is speed.
In the context of the question asked, this is nothing but technobabble.
Both TOR and VPN use "straight up cryptography", and both route traffic through additional servers, and both can only be as fast as the throughput through all servers involved.
VPN's are usually paid for, have a limited number of customers and route only through one additional server - and therefore tend to be faster.
The TOR network depends on volunteers and has many users - and routes through many servers - and that tends to be much slower.
Tends to be - there are huge speed differences both with TOR and VPNs.
I suspect OP is either limited in the department of abstract thought, or deliberately asking pointless & controversial questions.
It is absolutelynot(!) "technobabble!" The difference between the two technologies is actually very fundamental.
• VPN technologies merely wish to conceal the content of the message, and to prevent the injection of third-party content.
• TOR wishes to conceal the fact that the message is being sent, and to defend against hostile attempts to prevent it from arriving at its destination in one piece should its presence be detected.
Last edited by sundialsvcs; 05-05-2021 at 09:30 PM.
TOR's design purpose is: "We want to communicate through a network whose owners are hostile to our communication, and even to the fact that we are communicating at all. And/or whom we wish not to know that we are communicating at all, or that we even exist. But at least most parts of most of the messages must get through."Spies need to do things like that.
VPN's design purpose is: "We want to create a cryptographically-secure TCP/IP router or switch in software, acting as a transparent 'tunnel' between two subnets that its users can simply ignore." It's no secret that the two computers are talking: we just want to conceal what they say. Corporations, and workers in insecure coffee-shops, need to do things like that, because it eliminates the need to deploy other forms of security in which one poor soul might unknowingly make a mistake and so be talking "in the clear." Everything that passes through the tunnel will be encrypted, and the users don't have to know or care. To them, it is: "a [virtual ...] private network."
As you can see, although both of these use crypto and various other technologies to create a secure messaging-route between two parties, they do so in entirely different ways and to serve entirely different purposes. VPN of course champions speed ... you don't want the secure tunnel to be noticeably slower than doing without it. TOR champions secrecy and concealment and necessarily does so at the expense of speed.
Last edited by sundialsvcs; 07-05-2021 at 09:40 AM.
So the short answer is that they are two slightly different technologies doing two different things, so expecting the performance to compare makes no sense.
No, they are two very different technologies, doing two very different things with very different fundamental objectives. The only thing that they really have in common is that both of them use crypto.
TOR ("The Onion Router") had its roots in government / military research on how to maintain communications under hostile network conditions, while concealing both the identity and the location of the communicants, and the very fact that they were communicating at all. Naturally, if any fragments of those communications were to be identified and pieced-together by the opponent, they must be incomprehensible. Hence, the widely-scattered packets are encrypted.
VPN makes no secret as to who the parties are, nor that encrypted communication is happening. It simply seeks to make the crypto invisible to the clients at both ends of the tunnel ... as though it were simply a "dumb" network appliance. The network is not hostile to its presence – it just wants to eavesdrop if only it could.
Last edited by sundialsvcs; 07-07-2021 at 03:09 PM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.