Many sources online say that tor doesnt mask your ip from the ISP, and that VPNs do, not TOR. Credibility? What is the truth? Source?
The ISP will be able to see the first relay you are connecting to and the network traffic. They however wont be able to decrypt the traffic but they will know that you are using tor, how long you are using tor and how much traffic went through tor.
No, Tor doesn’t hide your IP from your ISP, they literally give it to you. And no, VPNs also do not hide it, nothing can hide something from the people that give it to you.
They can tell you’re using it, for how long, how much data was sent. What they can’t tell is what you’re doing on it.
ISPs give you your IP. That’s why you need an ISP in the first place, among other things. Tor does encrypt your traffic, so your ISP cannot see your traffic, but your ISP will see your IP no matter what you do, seeing as they are your Internet Service Provider. (What did you think that the provider bit meant? lol)
If you use tor, your isp will see that you are sending tor encrypted traffic to a tor node.
To disguise your traffic from from your isp, the recommended tool is using bridges with tor Tor Project | Bridge
This disguises your tor traffic as a different protocol like https or something untill it gets into the tor circuit fully
You can use a VPN with tor for a similar solution, but only in very specific situations. Generally, it’s not recommended mixing the two Can I use a VPN with Tor? | Tor Project | Support
Wrong! Let’s try a little experiment so that you don’t run around spreading any more misinformation. Without being connected to Tor or a VPN, go to these sites:
Close the browser, and connect to TOR… Then go to the same sites.
Then, connect to your VPN and go to the same sites.
You will get 3 totally different results…
That is incorrect. If you have a VPN client connection, then it is encrypted end to end. Your ISP can’t see your traffic. With tor and no VPN they can see your traffic on the entry and exit nodes.
To disguise your traffic from from your isp, the recommended tool is using bridges
To disguise your ***Tor usage. Tor already hides your traffic without bridges. Bridges keep your ISP from knowing the user is using Tor.
What you are saying is true, however OP is asking about ISP not websites.
Yes, traffic, but not IP.
And, the VPN is only client to server encrypted, from you to the VPNs server and there “they” can see your traffic, same with Tor, from you to the exit node.
There is no such thing as an “entry node”. Your own computer is effectively the entry. Your are encrypted on your first hop and your ISP can not see your traffic on Tor or VPN.
An ISP, if they care to look up what IPs you are connecting to, can tell both if you are connected to a VPN or Tor. So far as privacy from your own ISP is concerned, neither option has a benefit over the other.
No, I’m just sleeping.
And this is where I have to point out: IP address and traffic is two things. OP also did not ask about hiding Tor traffic.
I never said any such thing.
My entire LAN is on a VPN, and I use encrypted DNS, and I also have A Torbox on a different LAN. My ISP can’t see any of my traffic because I’m not using their DNS servers. I don’t want to sound like a Dick, but you insist that you are right, and you really don’t understand how this all works. Take a look at this:
Ok, good for you. Not everyone does that. And they still known your IP address. I know and understand how it works. I’m not saying anything you are saying is wrong.