The listings featured on this site are from companies from which this site receives compensation. This influences: Appearance, order, and manner in which these listings are presented.
Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers. These take into consideration the reviewers’ independent and professional examination of the products/services.

Ownership

vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

Affiliate Commissions Advertising

vpnMentor contains reviews that follow the strict reviewing standards, including ethical standards, that we have adopted. Such standards require that each review will take into consideration the independent, honest and professional examination of the reviewer. That being said, we may earn a commission when a user completes an action using our links, at no additional cost to them. On listicle pages, we rank vendors based on a system that prioritizes the reviewer’s examination of each service, but also considers feedback received from our readers and our commercial agreements with providers.

Reviews Guidelines

The reviews published on vpnMentor are written by community reviewers that examine the products according to our strict reviewing standards. Such standards ensure that each review prioritizes the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings we publish may also take into consideration the affiliate commissions we earn for purchases through links on our website.

Do VPNs Give Anonymity? Not Alone, But These Tools Help

John Norris Updated on 2nd July 2023 Technology Researcher

Privacy-seekers and political activists around the world are desperate for anonymous web browsing. For this market, simple privacy is not enough*. They want online access without leaving any traces of their identities behind.

Yet achieving it is difficult to say the least, thanks to the online traffic monitoring efforts and deanonymization abilities of government spy agencies, like the NSA. In fact, search engine results for the keyword “web anonymity” contain several articles that say the endeavor is a unicorn.

From one perspective, these articles are correct. A truly determined adversary will eventually find a way to track its targets. Yet from another perspective, truly determined privacy seekers can achieve nearly anonymous internet access when they use the right mix of the Tor anonymity network, a VPN network, and Bitcoins.

Simply put: this is a powerful set-up that removes all identifying information from your online connection.

So in this article, we'll explain how each ingredient works together to provide this excellent web anonymity as well as discuss some of its pros and cons.

Start with Tor via TAILS

Tor is free software and an open network that helps you defend your web anonymity against traffic analysis. Edward Snowden, for example, is said to have used Tor for his whistle-blowing activities. This network takes your original DNS request and routes it through three encrypted nodes before granting the request.

Tor for Web anonimity

There are multiple ways to access the Tor network, and the most privacy-concerned users do so through The Amnesic Incognito Live System (TAILS). This is an operating system launched from a DVD, USB stick, or SD card. When you boot up with TAILS, all of your internet connections rout through the Tor network automatically. Like Mac’s OS or Windows, TAILS comes with several built-in applications, such as a web browser, instant messaging client, email client, office suite, and an image and sound editor. The major difference is that TAILS’ programs a pre-configured with security in mind, unlike the Apple's and Microsoft's of the world.

The main problem with using the Tor by itself is government agencies have begun targeting it. Just last year, the Tor project accused the FBI of colluding with Carnegie Mellon University to help the agency deanonymize users. In the accusation, Tor said the FBI paid a reported $1 million to the University, enabling it to launch a sophisticated attack. On one day, 100 malicious machines joined the network and began to deanonymize people who operated and accessed Tor hidden services.

Tor reacted quickly and eliminated the malicious machines, but damage may have been done. The U.S. government reportedly used information that coincided with this breach to shut down websites on the dark web that sold illegal goods and services, including the Silk Road 2.0 drug bazaar.

Add A VPN for an Extra Layer of Protection

Map

The biggest clue that unravels your web anonymity is your IP address. Luckily, a trusted VPN can go a long way toward eliminating this problem.

Once you've started your Tor browser and connected to a VPN, your Tor-assigned IP address will be concealed behind one provided by the VPN service. Consequently, even if trackers detect your activity emerging from Tor, their tracking capabilities will be short-lived.

This setup of VPN through Tor has many web anonymity benefits:

  • the VPN provider cannot ‘see’ your real IP address – only that of the Tor exit node.
  • All of your internet traffic is still routed through Tor.
  • You are protected from malicious Tor network participants because the VPN network encrypts data before it enters/exits Tor.
  • The VPN can geo-spoof your location.
  • You can access the web sites that block Tor exit nodes.

There are some downsides as well for web anonymity. For example, not all VPN services allow VPN through Tor. Read our reviews to find the best VPNS for this set-up.

Another problem is that quality VPN service costs money. This is problematic because payment records leave a major trail for government agencies to follow. In a high-profile U.S. court case, for example, the FBI investigated payments made from a criminal defendant to the parent companies of Private Internet Access and HotspotShield VPN.

Rank
Provider
Our Score
Discount
Visit Website
1
medal
9.8 /10
Save 49%!
2
9.8 /10
Save 77%!
3
9.6 /10
Save 83%!

Pay with Bitcoins

The payment record worry disappears, however, if you pay with Bitcoins. We’ve covered Bitcoin operations and cryptography in other articles. For our purposes here, the important point is this  virtual currency is untraceable to its source payor, if you execute the transaction correctly.

BitCoin

It’s also important to say that not all VPN services accept Bitcoin. This makes virtual currency acceptance a key decision point for any privacy seeker looking at VPNs.

Lastly, the issue of payment is vital because it’s a best practice to switch VPN providers periodically. By doing so, you’ll reduce the potential of trackers monitoring a constant VPN IP address. Just make sure you pay with properly-mixed Bitcoins, no matter which VPN service you pick.

This Web Anonymity System Sacrifices Speed

Compared to direct access to servers, the Tor system is slow. The network provides anonymity by building circuits with three relays, which takes more time. The network also tries to build circuits with relays in different countries, which make connections travel more.

While they operate differently, VPNs also route your connection to a distant server (although many services allow you to pick the server to connect to).

When these two elements combine, the result is a reliably slow connection.

Summary: Web Anonymity Requires 360 Degrees of Attention

For everyday internet surfers, web anonymity is neither realistic or in demand. And for those users who want an added level of privacy, a VPN will take care of all your needs.

Yet the internet is used for an ever-increasing spectrum of activity, and several people need to protect their identity as a matter of life or death.

If you are one of them, this system of Tor, a VPN, and Bitcoin payments is about as good as you can do. For the trade-off of some browsing speed, your IP address will be buried beneath a complex web of encryption.

For all these precautions, there are several other ways investigators can track your online activity, including (but certainly not limited to), discovering account logins with identifying information, capturing data through fake websites, and deanonymizing users via malicious downloads. These techniques show that what you do on the internet can unmask your identity as much as your connection.

We’d love to hear your thoughts. Do you want complete web anonymity? Is there a better way of hiding your online identity than the system we’ve described here? Let us know in the comments.

*We here at vpnMentor support those who prize their privacy. We do not, however, condone any illegal activity.

Privacy Alert!

Your data is exposed to the websites you visit!

Your IP Address:

Your Location:

Your Internet Provider:

The information above can be used to track you, target you for ads, and monitor what you do online.

VPNs can help you hide this information from websites so that you are protected at all times. We recommend ExpressVPN — the #1 VPN out of over 350 providers we've tested. It has military-grade encryption and privacy features that will ensure your digital security, plus — it's currently offering 49% off.

Visit ExpressVPN

About the Author

John Norris worked as a tech writer, journalist, and instructional designer before turning to tech blogging in 2013. While focusing on digital security and privacy issues, he is interested in any tech area that can enrich people's lives.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback