Onion over VPN setup and how to use it safely

Onion over VPN is the phrase used to describe a setup in which you use both a VPN and Tor simultaneously. Also called Tor over VPN, it offers many security and privacy advantages over using either of the two tools alone.

An Onion over VPN setup requires just three things to get set up:

  • Internet access
  • A VPN
  • Tor Browser, or some other means of connecting to the Tor network

We’ll explain the benefits, disadvantages, topology, and alternatives to Onion over VPN below. But if you just want a quick tutorial, here’s how to set up Onion over VPN:

  1. Open your VPN app and connect to it. We recommend NordVPN.
  2. After the VPN connection is established, open Tor Browser

And that’s it. Really! You can now benefit from the combined anonymity, security, and privacy of both Tor and a VPN.

Why use onion over VPN? Pros and cons

The onion over VPN setup offers several benefits:

  • Your ISP can see that you’re using a VPN, but not that you’re using Tor
  • Your VPN cannot see what sites you visit or the contents of your connection
  • You can access both dark web .onion sites
  • You can anonymously surf the clear web
  • The Tor entry node cannot see your real IP address, only that of the VPN server
  • You get the flexibility to use a VPN by itself with a normal browser for non-critical tasks

But, there are also some drawbacks:

  • Websites and apps can see that you’re visiting through a Tor exit node. Some sites might block you or not function well as a result.
  • Your VPN can see your real IP address and knows you’re using Tor
  • You could potentially expose data to compromised Tor exit nodes
  • Using a VPN and Tor together will significantly slow down your connection

Onion over VPN encryption and traffic flow

onion over vpn

When using Tor over VPN, your outbound internet data flow looks like this:

  1. Data is encrypted by the VPN
  2. Data is encrypted again by Tor
  3. Data is sent to the VPN server
  4. The VPN decrypts the data, but it is still encrypted by Tor
  5. Data is sent through the Tor network

What happens next depends on whether you’re accessing the dark web or clear web. If you’re visiting a .onion site on the dark web, your data is decrypted upon arriving at its destination. If you’re visiting the clear web, data is decrypted at a Tor exit node and forwarded to the website.

Read more: Step by step guide to safely accessing the dark web

For inbound traffic, the flow is as follows:

  1. Data is sent from a website, app, or service
  2. Tor encrypts the data
  3. The data is sent through the Tor network to the VPN server
  4. The VPN encrypts the data again
  5. The twice-encrypted data is sent from the VPN server to the end user device
  6. Tor decrypts the data
  7. The VPN decrypts the data again

VPNs with built-in onion over VPN support

A few VPNs come with built-in support for onion over VPN, which means you don’t need Tor browser to get it set up. Just connect to a Tor over VPN server and you’ll be good to go.

Some VPNs that offer onion over VPN servers include:

Note, however, that such a feature has its pros and cons.

On the plus side, you can now use any application with Tor, not just Tor browser. Configuring individual applications to use Tor can be a pain, so having it built into the VPN is definitely convenient.

On the downside, the VPN provider could hypothetically analyze your traffic before it’s encrypted by the Tor network. Be sure to choose one with a no-logs policy. You also don’t get the other benefits of using Tor browser, like script and tracker blocking. If you opt to use your normal browser, websites could still identify you through stored cookies and other identifiers.

Onion over VPN vs VPN over onion

An alternative to onion over VPN is VPN over onion. It switches up the flow order, swapping Tor and the VPN. Although it might seem similar at first glance, it usually serves a very different purpose and comes with different pros and cons. Setting up VPN over onion is more difficult and beyond the scope of this article, but we’ll contrast it with onion over VPN:

  • Your ISP can see you’re using Tor, but not the VPN
  • You can only visit clear web sites, not dark web .onion sites
  • Your VPN can see your data and what sites you visit
  • You can access websites and apps that normally block connections from Tor exit nodes
  • Less vulnerable to compromised exit nodes
  • No packet discrimination by Tor exit nodes
  • Requires VPN provider’s assistance to set up
  • Tor entry nodes see your real IP address

Generally speaking, onion over VPN is much easier to set up and offers more utility than VPN over Tor, but both have their place.

See also: How to block ISP tracking