I made a comparison of Tor and VPNs

There really wouldn’t be a need to do that. If you want to bypass a block that interferes with tor or obfuscate the fact you’re using tor, then you can use a bridge. More information on tor bridges here: BRIDGES | Tor Project | Tor Browser Manual

If I recall correctly, TOR has built-in options to make use of bridges. If you need to grab more or different bridges, then you can check out BridgeDB: https://bridges.torproject.org/

The bridges primarily help with bypassing censorship of connections to tor, but like previously mentioned, they can help obfuscate the fact you’re using tor.

It won’t really be safer than just Tor Browser.

How do you connect to your vps provider when signing up for the first time? How do you pay your vps provider?..
The vps is on your name…/ connected to your id

You’d be the only person using it so all your activity would be attached to it and it’s still a single point of failure. However you don’t have to trust a VPN provider anymore. It has advantages over a regular VPN and the disadvantage that it cannot really be used against geo-blocking.
However if you strive for real anonymity Tor Browser is the better option. It all depends on your goal.

You can use a VPS to make your own VPN.

RiseupVPN and Mullwad are open source. The app of ProtonVPN is also open source.

As far as I know, only some of the newer experimental/unfinished dVPNs (distributed/decentralised VPNs) have open source clients and servers. Otherwise you’d have to run something with Wireguard/OpenVPN yourself.

Perhaps checking the site this sub-reddit is dedicated to would be a good idea? Also Rule. 12.

Thanks for the feedback. I’m aware of the design issues, I usually don’t do these graphics and this was quickly made as a response to another post.

Good idea but badly executed. Visually it really sucks because of the low resolution and terrible color contrast. It is misleading, it claims that it is only possible to spy on traffic on a VPN, when using TOR is just as dangerous and over the years has caused many more problems. The optional browser is also added to a service comparison.

Of course Tor isn’t perfect and has its risks as well but it is much harder to spy on Tor users based on Tor’s design.

The optional browser is also added to a service comparison.

I oversimplified this a little because usually people use Tor with Tor Browser and it is the only recommended way to browse over Tor. I should have stated that somewhere.

It is one way to do it, though as others mention, tor bridges are another way

Multi VPN hops means if the end point is discovered ip wise, and they get the source from that, it will be another provider to try to get more details out of, which may be impossible depending on location.

I think a few Vpns like proton and a few others support multiple hops

And yes, if a host has multi hop, and then you use Linux in some form, then use tor, you’re super private. That would be hard to beat (well then again maybe not, someone could do all that, at a random coffee shop also)…
But correct

You’d need to create your own VPN server using a VPS from somewhere like Vultr, you essentially get to choose the bandwidth you have available. You can also host your VPS in a different region to access Geo-restricted content. Not the best option from an anonymity perspective but then again no VPN really is, it will however tunnel your connection so that the current network you’re on can’t see your traffic.

A strong personal commitment to anti-censorship, or you’re planning on doing something with/to the traffic. I don’t want to over sell the risk here, there are plenty of people who fall into the former category. The roots of the anti-censorship community on the internet run deep and DIY.

Not only does the VPN know your IP but it can also link all your traffic to your account.

That’s exactly as true for VPN.

This presumes the US isn’t doing traffic shaping on the fuckton of routing nodes and exit nodes they’re confirmed to run, and everything you said about https applies equally to VPN. And there are VPN providers who take Bitcoin or even cash through the mail, so you absolutely have the choice of VPN without giving up your identity. But while I can know who is running my VPN, and if they’ve ever been subpoenaed I can independently verify if they actually keep logs of my traffic or not, I know jackshit about who’s doing what on my exit nodes.

I’m not saying Tor is bad or that VPN doesn’t have limitations, but this graphic really overstates the advantages of Tor vs VPN.

You can’t assume all traffic is HTTPS, many sites still have some aspect which is not, especially the ones designed to track your behavior and serve ads. Plus, the whole point here is you comparing the two techs; if you assume https, they are on equal ground, if not, one could argue a VPN is ‘safer’.

That’s the same for a vpn

Just make sure your WiFi radios are not listening or communicating anything they hear.

Out of the box, probably so if you do not install any tools to use.

On a mobile device, you are only fooling yourself. (I know what Tails is… just saying if you are using a mobile device, all bets are off).

Everything google hates tor. Actually, I’m pretty sure google just hates everything I personally do, seeing as I can barely ever access their sites, even on firefox. Obviously using a lot of extensions but still, most other sites work fine.