I2P vs. Tor vs. VPN: Which Is More Secure?
Pinterest Stumbleupon Whatsapp
Advertisement

When we talk about security and privacy, there are several common acronyms that get thrown around. You’ve likely encountered the privacy and anonymity focused browser Tor. And VPNs frequently feature in mainstream media articles. There is another option to consider, too: I2P.

But what privacy acronym suits your needs? Let’s explore what I2P, Tor, and VPNs are, and which one is right for you Tor vs. PirateBrowser vs. Anonymox: Privacy and Access Compared Tor vs. PirateBrowser vs. Anonymox: Privacy and Access Compared Tor is no longer the only browser offering a secure, privacy-focused internet experience. Several other strong choices are now available. But what solution is right for you? Let's take a look. Read More .

Tor

The “Tor” name derives from the original software project name: The Onion Router. Tor software directs web traffic through a worldwide system of interconnected relay nodes. This is known as “onion routing” because your data passes through many layers.

tor browser

In addition to the layers, Tor encrypts all network traffic, including the next node IP address. Encrypted data passes through multiple randomly selected relays, with only a single layer containing the IP address for the following node decrypted during transit.

The final relay node decrypts the entire package, sending the data to its final destination without revealing — at any point — a source IP address.

How Do I Use Tor?

The Tor Browser is the easiest way to use Tor software. Download and install the browser as you would any other piece of software. The setup will continue after you open Tor Browser for the first time. Then you browse as normal. It will be slightly slower than normal — sending the data through multiple relays takes time, I’m afraid.

Why Should I Use Tor?

The Tor Browser encrypts all data transmissions. As such, a huge range of people use it: criminals, journalists, hackers/crackers, law enforcement (to protect communications and solve crimes), government agencies, and much more. In fact, Tor started life as a U.S. Naval Research and DARPA project. We’ve even written a guide on how you can use the hidden web as a research tool Journey Into The Hidden Web: A Guide For New Researchers Journey Into The Hidden Web: A Guide For New Researchers This manual will take you on a tour through the many levels of the deep web: databases and information available in academic journals. Finally, we’ll arrive at the gates of Tor. Read More .

The Tor Browser is also one of the most direct routes to the dark web (not to be confused with the deep web 6 Little-Known Corners Of The Deep Web You Might Actually Like 6 Little-Known Corners Of The Deep Web You Might Actually Like The deep web has a bad reputation—just about every bad thing you can think of is available there. But there are also some really great things you might want to check out. Read More ). The dark web is the so-called “dark underbelly” What Is the Deep Web? It's More Important Than You Think What Is the Deep Web? It's More Important Than You Think The deep web and the dark web both sound scary and nefarious, but the dangers have been overblown. Here's what they actually and how you can even access them yourself! Read More of the regular (sometimes referred to as “surface”) web that we browse daily. Whenever you hear a story about an online marketplace selling illicit substances and goods, they’re talking about a site hosted on the dark net.

But Tor isn’t just about crazy secret marketplaces and secret communications The Rise and Fall of Ross Ulbricht, AKA the Dread Pirate Roberts The Rise and Fall of Ross Ulbricht, AKA the Dread Pirate Roberts The Silk Road was like Amazon for the black market. Its leader, the Dread Pirate Roberts, often espoused an anti-establishment, libertarian philosophy — but what else do we know about him? Read More . You can use it for other, “normal” things. For instance, airlines use complicated algorithms to keep tabs on interest in their flights, adjusting price with demand. Keep visiting the same site, using the same IP, and the airline knows you’re interested — but the price usually increases. Check the same flights using the Tor Browser and you can find some interesting discounts.

Will Tor Protect My Privacy?

Yes. The Tor design protects privacy from bottom to top. If you’re just using Tor Browser to browse the internet, you’re not going to alert anyone, anywhere. However, hardcore privacy advocates consider the Tor network compromised. National Security Agency (NSA) program XKeyscore records everyone who visits the Tor webpage Your Interest in Privacy Will Ensure You're Targeted By The NSA Your Interest in Privacy Will Ensure You're Targeted By The NSA Read More and downloads the Tor Browser. Furthermore, they class those that download and install it as “potential extremists.”

So, yeah, sorry, you’re on a list now. (They think similarly of those who use Linux, so I wouldn’t worry too much.)

Tor only encrypts data sent and received within the Tor Browser (or a different browser using Tor software). It does not encrypt network activity for your entire system.

I2P

The Invisible Internet Project (I2P) is a garlic routing protocol. This is a variant of the onion routing protocol used by Tor.

I2P is an “anonymous overlay network.” The garlic routing protocol encrypts multiple messages together to make data traffic analysis difficult, while simultaneously increasing network traffic speed. Garlic routing takes its name from actual garlic. Each message is a “garlic clove,” with the entire encrypted bundle representing the “bulb.” Each encrypted message has its own specific delivery instruction, and each end-point works as a cryptographic identifier (read one of a pair of public keys).

i2p router configuration

Each I2P client (router) builds a series of inbound and outbound connection “tunnels” — direct peer-to-peer (P2P) networking. A major difference between I2P and other P2P networks you have used is the individual selection of tunnel length. The tunnel length is a factor in anonymity, latency, and personal throughput, and forms part of the individual peer threat model.

The result is that the smallest number of peers possible relay messages according to each peer’s sender and receiver threat model.

How Do I Use I2P?

The easiest way to use I2P is by downloading and installing the official install package. Once installed, open Start I2P (restartable). This will open a locally hosted web page in internet Explorer, the I2P default browser (you can change this later). This is the I2P Router Console, or in other words, the virtual router used to maintain your I2P connection. You’ll also notice the I2P Service command window — ignore this and leave it running in the background.

The I2P service can take a few minutes to get up and running, especially during the first boot. Take the time to configure your bandwidth settings.

i2p service command window

I2P allows its users to create and host hidden websites, known as “eepsites.” If you want to access an eepsite, you’ll need to set your browser to use the specific I2P proxy. You can find the I2P proxy configuration details here.

Why Should I Use I2P?

I2P and Tor offer similar browsing experiences for most part. Depending on your I2P bandwidth configuration, it is probably slightly faster than Tor Browser, and runs from the comfort of your existing browser. I2P is full of hidden services, many which are faster than their Tor-based equivalents — a massive plus if you’re frustrated with the sometimes infuriating Tor network.

I2P runs alongside your regular internet connection, encrypting your browser traffic. However, I2P isn’t the best tool for browsing the open web anonymously. The limited number of outproxies (where your traffic re-joins “regular” internet traffic) mean it is much less anonymous when used this way.

Will I2P Protect My Privacy?

In a nutshell, yes. It will protect your privacy very well, unless you’re using it for regular web browsing. And even then, it would take significant resources to isolate your web traffic. I2P uses the distributed P2P model to ensure data collection, statistic gathering, and network overviews are difficult to complete. Furthermore, the garlic routing protocol encrypts multiple messages together, making it much more difficult to perform traffic analysis.

The I2P tunnels we discussed earlier are uni-directional: data only flows one way. One tunnel in, one tunnel out. This alone provides greater anonymity for all peers.

I2P only encrypts data sent and received through a configured browser. It does not encrypt network activity for your entire system.

VPN

Finally, we have the Virtual Private Network (VPN). A VPN works differently to both Tor and I2P. Instead of focusing solely on the encryption of browser traffic, a VPN encrypts all incoming and outgoing network traffic. In that sense, it offers regular users an easy route to protecting their data, but there are some caveats that we’ll explore in a moment.

How a VPN Works

Normally, when you send a request (e.g. click a link in your web browser or fire up Skype for a video-call), your request pings to the server holding the specified data, and it returns to you. The data connection is usually unsecured, and anyone with enough knowledge of computers can potentially access it (especially if using standard HTTP rather than HTTPS).

A VPN connects to a predefined, privately owned server (or servers), creating a direct connection called a “tunnel” The Short MakeUseOf Guide to VPN Terminology The Short MakeUseOf Guide to VPN Terminology The need for a secure internet connection has never been more vital. A VPN is a great way to stop unwanted snooping in your internet traffic. We're here to cut through the VPN jargon. Read More (though with the rise in VPN use, this term isn’t seen as frequently). The direct connection between your system and the VPN server is encrypted, as is all your data.

VPNs are accessed through a client that you’ll install on your computer. The majority of VPNs use public-key cryptography How Does Encryption Work, and Is It Really Safe? How Does Encryption Work, and Is It Really Safe? Read More . When you open the VPN client and login in with your credentials, it exchanges a public-key 3 Essential Security Terms You Need to Understand 3 Essential Security Terms You Need to Understand Confused by encryption? Baffled by OAuth, or petrified by Ransomware? Let's brush up on some of the most commonly used security terms, and exactly what they mean. Read More , confirming the connection and protecting your network traffic.

Why Should I Use a VPN?

A VPN encrypts your network traffic. Everything involving an internet connection on your system is safe from prying eyes. There has been a massive surge in VPN popularity, too. They’re exceptionally useful for:

  • Securing your data on a public Wi-Fi connection.
  • Accessing region-restricted content.
  • An additional layer of security when accessing sensitive information.
  • Protecting your privacy from government or other invasive agencies.

Will a VPN Protect My Privacy

Yes, a VPN will protect your privacy — but here come those caveats I alluded to earlier. Like most things, you pay for what you get. There are numerous free VPN providers, but they don’t always protect you as thoroughly as you think.

For instance, many free VPN providers keep a log of all users, and their internet traffic. So while encrypted data is safe coming into and out of your computer, and to and from their server, there is a still a log of what you have been doing. And while the majority of VPN providers aren’t about to turn you into the authorities, they are legally obliged to turn over what they know if presented with a subpoena. If you want a truly secure, logless connection, check out these six privacy-focused VPNs 6 Logless VPNs That Take Your Privacy Seriously 6 Logless VPNs That Take Your Privacy Seriously In an age where every online movement is tracked and logged, a VPN seems a logical choice. We've taken a look at six VPNs that take your anonymity seriously. Read More .

VPNs are an excellent, easy way to take some privacy back, without having to change from your regular browser, or alter your general browsing habits and internet use.

Summary of Tor vs. I2P vs. VPN

If you want super-private browsing, access to the darkweb, and don’t mind a slight dip in internet speed, choose Tor.

If you want super-private access to hidden services and messaging tools across a distributed network of peers, and still don’t mind a slight dip in internet speed, choose I2P.

Finally, if you want to encrypt all your incoming and outgoing network traffic, and really, really don’t mind a slight dip in internet speed, choose a VPN.

Some choose to use Tor Browser over a logless VPN. Others simply fire up a free VPN 7 Completely Free VPN Services to Protect Your Privacy 7 Completely Free VPN Services to Protect Your Privacy If you're looking for a free VPN, the choices are currently limited, with many services switching to a paid model. These free virtual private networks can be used to avoid region blocking and more. Read More when they want to access their online banking in a local cafe (this is very sensible). Regardless, a VPN is now a vital piece of accessible security and privacy technology that I would advise anyone to consider 10 Reasons Why You Should Be Using a VPN 10 Reasons Why You Should Be Using a VPN Virtual Private Networks are affordable and easy to use. Along with a firewall and antivirus/anti-malware solution, here is exactly why you should have a VPN installed. Read More .

Do you prefer Tor to I2P? How about using either service over a VPN? Are you concerned about your online privacy? How do you ensure your online activity stays private? Let us know your privacy tips in the comments below!

Image Credits: ImageFlow/Shutterstock

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Tracy Wells
    December 14, 2017 at 2:18 am

    As of right now I prefer Tor as i2p is mindboggingly difficult to configure & figure out. Most of the tutorials about i2p are outdated and I can't find a simple step by step guide to even use it

  2. duncan
    November 28, 2017 at 9:50 am

    can i2p and tor operate on the same computer at the same time

    • Tracy Wells
      December 14, 2017 at 2:25 am

      From what I've read "yes". From my experience, I can't even get i2p to run by itself. Tor
      is much easier.