1
00:00:00,760 --> 00:00:05,900
in this video we want to understand the differences between the tor proxy and a vpn.

2
00:00:06,200 --> 00:00:08,450
now these are not the same type of tools.

3
00:00:08,450 --> 00:00:10,020
they are used for different reasons.

4
00:00:10,320 --> 00:00:12,800
and you've definitely heard of vpns before.

5
00:00:12,900 --> 00:00:18,000
every podcast and youtube video and whatever has an advertisement for a vpn.

6
00:00:18,140 --> 00:00:21,120
and the tor proxy is not as much talked about.

7
00:00:21,420 --> 00:00:24,360
but it's important to understand how they operate and what they do.

8
00:00:24,580 --> 00:00:33,130
so a tor proxy is really focused on hiding the source and destination and then hiding that source and destination during those hops, right?

9
00:00:33,130 --> 00:00:35,830
that's the whole the whole strength behind tor.

10
00:00:35,830 --> 00:00:37,410
it uses strong encryption.

11
00:00:37,410 --> 00:00:40,400
when you use the tor browser with it, you leave less of a trace.

12
00:00:40,780 --> 00:00:50,000
but the core of what tor does is those hops, that onion layering, onion routing protocol where it layers the encryption and you get that obfuscation from that.

13
00:00:50,020 --> 00:00:55,610
if we look at earlier when we talked about the problem with the isp being able to see things, right?

14
00:00:55,610 --> 00:01:06,010
if you want to get a file sent back to you, you have to make that connection and your isp can see the website you're going to, and they can potentially see the contents of the file if it's not encrypted.

15
00:01:06,010 --> 00:01:21,840
but in a different scenario, if you were going to connect to tor, you'd connect to your isp 1st, the traffic goes to tor, tor then sends back information about the circuit that it can connect to, and then you actually connect through that circuit through tor to request that same file.

16
00:01:21,980 --> 00:01:25,610
in this scenario, we're still looking at a problem of your ispcs.

17
00:01:25,610 --> 00:01:26,680
you're using tor.

18
00:01:26,740 --> 00:01:28,290
so it's not much different.

19
00:01:28,290 --> 00:01:37,870
they can't, they're not going to see the website you're going to, which might be a use case for the tor proxy, but they can still see that you're going to tor.

20
00:01:37,870 --> 00:01:51,760
beyond that, there's still the risk of that file being seen if it's not encrypted properly, meaning that if you're not using https, if you're not using at least tls encryption or some level of encryption on the website, there's still a risk of that file being in plain text.

21
00:01:54,100 --> 00:01:56,250
so let's break down a quick comparison, right?

22
00:01:56,250 --> 00:01:59,640
both of these tools, the isp doesn't see the destination you're going to.

23
00:01:59,900 --> 00:02:03,690
both of these tools, the destination can't see where you're coming from.

24
00:02:03,690 --> 00:02:09,640
they'll only see either the tor node or the vpn node and the traffic is encrypted along the internet.

25
00:02:09,860 --> 00:02:23,440
a vpn is a little bit different than tor because it uses pretty standard encryption, aes usually for transport, although you can select your level of encryption while tor focuses on the onion routed protocol and that onion encryption in there.

26
00:02:23,620 --> 00:02:26,510
vpns are paid for, for any good services.

27
00:02:26,510 --> 00:02:28,720
free vpns i would not trust personally.

28
00:02:29,140 --> 00:02:31,160
so pay for a vpn if you want one.

29
00:02:31,900 --> 00:02:33,200
tor is free though.

30
00:02:33,340 --> 00:02:37,430
a vpn, the browser can still leak information, so that's an important thing to note.

31
00:02:37,430 --> 00:02:43,680
but if you utilize the tor browser and the tor proxy together, you're actually a lot more safer from any potential leaks.

32
00:02:43,740 --> 00:02:48,480
and the tor proxy is open source, while a vpn does rely on your user trust.

33
00:02:49,140 --> 00:02:54,150
you have to trust a vpn that they actually don't keep the logs, that they're actually using the encryption.

34
00:02:54,150 --> 00:02:58,120
now you can check some of these things yourself, but if you don't have the knowledge, you're not going to know for sure.

35
00:02:58,300 --> 00:02:59,990
so those are the main differences.

36
00:02:59,990 --> 00:03:03,320
for the most part, you're going to want to use a vpn for day- to- day stuff.

37
00:03:04,460 --> 00:03:09,000
the tor proxy overall might be a better tool, but you don't always need the best tool.

38
00:03:09,020 --> 00:03:10,880
sometimes you need the tool that will work.

39
00:03:11,140 --> 00:03:12,610
but that's really it for this video.

40
00:03:12,610 --> 00:03:16,200
in the next video we're going to kind of debunk some vpn talking points.

41
00:03:16,220 --> 00:03:18,320
we mentioned a few of them throughout this video.

42
00:03:18,740 --> 00:03:21,250
so you'll probably know what we're going to talk about, but we'll do that.

43
00:03:21,250 --> 00:03:24,720
then we'll dive more into how the tor proxy works and onion routing generally.

44
00:03:25,180 --> 00:03:27,360
so let's continue on and i will see you there.