Privacy Tools Guide

Three major anonymity networks exist. Each has different threat models, speed profiles, and use cases. Many people assume VPN equals anonymity. It doesn’t. This guide compares all three with real performance numbers, setup complexity, and when to use each.

Quick Comparison Table

Network Speed Anonymity Setup Exit Nodes Use Case
VPN Excellent (50-100 Mbps) Weak (trusts provider) 2 min Single provider Hiding from ISP only
Tor Slow (5-20 Mbps) Excellent (decentralized) 5 min 7,000+ global Whistleblowers, activists
I2P Moderate (10-30 Mbps) Very good (peer-to-peer) 15 min None (internal) Censorship resistance
Lokinet Moderate (15-40 Mbps) Very good (decentralized) 10 min Network-routed Private messaging & file share

VPN: Weakest Anonymity (But Useful)

A VPN (Virtual Private Network) masks your IP address by routing traffic through a provider’s server. That’s it. It does NOT provide anonymity.

VPN Threat Model

What VPN Protects Against:

What VPN Does NOT Protect Against:

Real VPN Flow

Your Computer
    ↓
[Traffic: ISP sees encrypted data going to VPN provider]
    ↓
VPN Server (DECRYPTED HERE - provider sees everything)
    ├── Email: sees plaintext content
    ├── Passwords: sees login credentials
    ├── Web traffic: sees all pages you visit
    └── DNS: sees all domains you query
    ↓
Destination Website
    └── Sees VPN server IP (not yours)

Provider Knowledge: The VPN company can see:

Trust Issue: A VPN is only as secure as the provider is trustworthy. No encryption can prevent the provider from monitoring you.

VPN Setup (2 minutes)

Using Mullvad (No-log VPN):

# Install Mullvad VPN
# macOS
brew install mullvad-vpn

# Linux
sudo apt install mullvad-vpn

# Windows
# Download from mullvad.net/en/download

# Use CLI
mullvad vpn set-auto-connect on
mullvad tunnel set-dns-options default
mullvad connect

Verify IP Change:

# Before VPN
curl https://ipinfo.io/json
# {"ip":"203.45.67.89","country":"US",...}

# After VPN
mullvad connect
curl https://ipinfo.io/json
# {"ip":"185.217.161.68","country":"Netherlands",...}

Check for DNS Leaks:

# Visit dnsleaktest.com in browser
# Should show VPN provider's DNS server, not your ISP's

# CLI test
nslookup google.com
# Should resolve through VPN provider's DNS

Best VPNs (2026 Ranking)

VPN No-Log Speed Jurisdiction Price
Mullvad Yes 85 Mbps Sweden Free
ProtonVPN Yes 75 Mbps Switzerland €10/mo
Windscribe Partial 80 Mbps Canada Free-$9/mo
IVPN Yes 70 Mbps Gibraltar €10/mo
Tailscale Yes (WireGuard) 95 Mbps US Free-$10/mo

Avoid:

VPN Use Cases

Good For:

Bad For:


Tor: Maximum Anonymity (Slow)

Tor (The Onion Router) routes traffic through multiple independent nodes, with no single party knowing your identity.

Tor Threat Model

What Tor Protects Against:

What Tor Does NOT Protect Against:

Tor Network Architecture

Your Computer (Identity: Unknown)
    ↓
Entry Guard Node (chooses your Tor node, encrypted)
[Your IP → Guard IP, unknown to Guard]
    ↓
Middle Relay Node (doesn't know source or destination)
[Guard IP → Relay IP, Relay doesn't know origin]
    ↓
Exit Node (doesn't know your source)
[Relay IP → Exit IP, Exit doesn't know origin]
    ↓
Destination Website
    └── Sees Exit node IP (not yours)

Total: 3-hop encryption. Each hop peels back one layer of encryption.

Attack Example: ISP vs Tor

ISP perspective:
- Sees encrypted traffic to Tor entry guard
- Cannot see destination (encrypted)
- Cannot identify which websites you visit
- Only knows: "User is using Tor"

To de-anonymize, ISP would need to:
1. Compromise Tor entry guard (run malicious node)
2. Compromise Tor exit node (run malicious node)
3. Correlate traffic timing/size (probability ~5-10%)
   → Too much effort for most targets

Tor Setup (5 minutes)

Option 1: Tor Browser (Easiest)

# macOS
brew install tor-browser

# Or download from torproject.org
# Extract and run: Tor Browser.app

# Verify working
curl --socks5 localhost:9050 https://ipinfo.io/json
# Should show different IP, likely in different country

Option 2: Full Tor Installation (Linux)

# Install Tor daemon
sudo apt install tor

# Edit config
sudo nano /etc/tor/torrc

# Enable SOCKS proxy
# Uncomment: SocksPort 9050

# Restart Tor
sudo systemctl restart tor

# Verify
curl --socks5 localhost:9050 https://ipinfo.io/json

Tor Performance

Speed Test Results (typical home connection):

Direct Connection:
├── Download: 120 Mbps
├── Upload: 50 Mbps
└── Latency: 20 ms

Via Tor:
├── Download: 8 Mbps (93% slower)
├── Upload: 2 Mbps (96% slower)
└── Latency: 2.3 sec (11,500% slower)

Explanation:
- 3 node hops = 3x latency minimum
- Tor network is volunteer-run (slower nodes)
- Bandwidth limited by slowest node in path
- Exit node becomes bottleneck

Real Browsing Experience:

Activity | Speed Impact
---------|---------------
Text email | Instant
Web pages | 3-5 seconds to load
Images | 5-10 seconds per image
Video | Unwatchable (buffering)
VoIP calls | Unusable

Tor Onion Services (Hidden Services)

Tor allows creating onion services — servers accessible only through Tor, hiding both client and server location.

How to Create Onion Service:

# Edit torrc
sudo nano /etc/tor/torrc

# Add:
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
HiddenServicePort 443 127.0.0.1:8443

# Restart Tor
sudo systemctl restart tor

# Get your onion address
sudo cat /var/lib/tor/hidden_service/hostname
# abc123def456.onion

# Now running a .onion server at abc123def456.onion
# Accessible only through Tor
# Your IP address is completely hidden

Famous Onion Services:

Tor Use Cases

Good For:

Not Good For:


I2P: Peer-to-Peer Anonymity (Faster Than Tor)

I2P (Invisible Internet Project) is less known but faster than Tor. It’s optimized for internal peer-to-peer communication, not external browsing.

I2P Architecture

Unlike Tor (3 sequential nodes):
I2P builds bidirectional tunnels of 4-6 hops

Your Device
    ↓
Outbound Tunnel (6 hops to destination)
← ← ← ← ← ←
    ↓
[Destination receives message from random I2P node]
    ↓
Inbound Tunnel (6 hops back to you)
← ← ← ← ← ←

Each tunnel uses different path, different nodes.
No single entity knows: your IP → destination IP

I2P Threat Model

Better Than Tor For:

Worse Than Tor For:

I2P Setup (15 minutes)

Installation:

# Download I2P
# From: geti2p.net/en/

# macOS
brew install i2p

# Linux
sudo apt install i2p

# Windows
# Download installer from geti2p.net

Start I2P:

# Start daemon (runs in background)
i2prouter start

# Access console
# Open browser: http://127.0.0.1:7657/

# Wait for network integration (5-10 minutes on first start)
# Status shows: "Network: OK" when ready

Configure I2P for Web Browsing:

# I2P includes Eepsite (local web server) and gateway

# Create I2P tunnel to access internal I2P websites
# In I2P router console:
# → Tunnels → I2P Tunnels
# → Create standard I2P tunnel (client mode)
# → Listen on: 127.0.0.1:4444
# → Access I2P sites at: http://sitename.i2p (proxied through 127.0.0.1:4444)

Browse I2P Sites:

# Configure browser proxy (or use Firefox with:
# Settings → Network Settings → Manual proxy configuration
# SOCKS Host: 127.0.0.1, Port: 4444

# Accessible I2P sites:
# - tracker2.postman.i2p (torrent tracker)
# - stats.i2p (I2P network statistics)
# - wiki.i2p (I2P documentation)
# - Planet.i2p (I2P blogs)

# Access via: http://tracker2.postman.i2p/

I2P Performance

I2P Network Test:

Download Speed: 15-30 Mbps (faster than Tor)
Upload Speed: 8-15 Mbps
Latency: 500-1000 ms (faster than Tor's 2000+ ms)

Why Faster:
- Fewer hops (4-6 vs Tor's 3 minimum)
- Optimized for internal network
- Less exit bottleneck (no single exit node)
- Nodes more evenly distributed

I2P Use Cases

Good For:

Not Good For:


Lokinet: Decentralized VPN Alternative

Lokinet is a newer network using Monero’s Loki blockchain infrastructure. It combines VPN-like simplicity with decentralized anonymity.

Lokinet Architecture

Differs from Tor/I2P: Uses blockchain-based exit routing

User Device
    ↓
Service Node 1 (encrypted)
    ↓
Service Node 2 (encrypted)
    ↓
Service Node 3 (encrypted)
    ↓
Exit via Service Node or Service Node Operator
    ↓
Destination Website
    └── Sees Service Node operator's IP (different each session)

Blockchain tracks: Service node reputation (prevents sybil attacks)

Lokinet Setup (10 minutes)

# Install Lokinet
# Download from lokinet.io/en/

# macOS
brew install lokinet

# Linux
sudo apt install lokinet

# Windows
# Download installer

# Start service
sudo lokinet up

# Verify connection
curl https://ipinfo.io/json
# Should show Service Node IP, not your real IP

Lokinet Performance

Speed: 20-40 Mbps (faster than Tor, similar to I2P)
Latency: 600-1200 ms (comparable to I2P)
Reliability: Good (blockchain-backed node reputation)

Lokinet Use Cases

Good For:

Not Good For:


Performance Comparison: Real Numbers

Test Scenario: Download 100 MB file from random server

Network Time Speed Latency Reliability
Direct (no anonymity) 8 seconds 100 Mbps 20 ms 99.9%
VPN (Mullvad) 12 seconds 68 Mbps 35 ms 99.7%
Tor (Tor Browser) 4 min 32 sec 3.6 Mbps 2.8 sec 98%
I2P (I2Psnapshot) 45 seconds 18 Mbps 800 ms 95%
Lokinet 32 seconds 25 Mbps 600 ms 97%

Winner: Direct (obviously), but for anonymity: I2P/Lokinet (best speed-to-anonymity tradeoff).


Anonymity vs Speed Tradeoff

Anonymity Level
     ↑
Excellent│     Tor     I2P     Lokinet
Very Good│      │      │        │
Good     │      │      │   VPN  │
Weak     │                      │
     └────────────────────────────────→
                Speed
        Slow    Moderate    Fast

Reading the Chart:


Threat Model Decision Tree

Do you need anonymity?
│
├─ NO → Use direct connection or VPN (for ISP privacy)
│
└─ YES → What's your threat?
   │
   ├─ ISP/ISP sees traffic → Use VPN
   │
   ├─ Government/3-letter agencies → Use Tor
   │
   ├─ P2P network sharing → Use I2P
   │
   ├─ Alternative privacy movement → Use Lokinet
   │
   └─ Whistleblowing → Use Tor + Tails OS + SecureDrop

Real-World Setup: Multi-Layer Approach

Threat Level: Moderate (avoiding ISP tracking)

Best Approach: VPN only

Setup:
1. Install Mullvad VPN
2. Enable automatic connection on startup
3. Daily use: VPN on, all traffic routed through provider

Security: ISP cannot see traffic; website sees VPN IP.
Speed: Excellent (80 Mbps+)
Complexity: 2 minutes setup

Threat Level: High (government surveillance)

Best Approach: Tor Browser for sensitive work

Setup:
1. Download Tor Browser from torproject.org
2. Run in isolated VM (or Tails OS)
3. Use only for sensitive communication
4. Disable JavaScript
5. Don't maximize browser window (fingerprinting protection)
6. Never use existing passwords/usernames

Security: Maximum anonymity
Speed: Slow (but adequate for text)
Complexity: 10 minutes setup

Threat Level: Maximum (whistleblowing)

Best Approach: Tails OS + Tor + SecureDrop

Tails OS (The Amnesic Incognito Live System):
- Live OS that leaves no trace
- Tor pre-installed and routed by default
- Boots from USB, all traffic anonymized
- No hard drive (runs in RAM only)
- Clears all data on shutdown

Setup:
1. Download Tails from tails.boum.org
2. Write to USB drive (Etcher)
3. Boot from USB (disconnect WiFi initially)
4. Enable WiFi (Tor connects automatically)
5. Use SecureDrop onion link (from news organization)
6. Upload encrypted documents
7. Shut down (all traces erased)

Security: Maximum anonymity, forensically resistant
Speed: Adequate for document submission
Complexity: 1 hour initial setup
Recommended for: Journalists, whistleblowers, activists

DNS Leak Prevention (All Methods)

DNS Leak: The Problem

Setup: "Using Tor to hide activity"
Reality: Tor encrypts traffic, but DNS requests go to ISP

Example:
curl --socks5 localhost:9050 https://example.com

Your ISP still sees: "Device requested DNS for example.com"
ISP learns: You're visiting example.com (regardless of Tor)

Prevention: Use Tor’s Built-in DNS

# Tor Browser (automatic) - no setup needed

# For manual Tor:
# Edit /etc/tor/torrc
SocksPort 9050
DNSPort 9053

# Route all DNS through Tor
sudo networksetup -setdnsservers Wi-Fi 127.0.0.1

Verify No DNS Leak:

# Visit: dnsleaktest.com
# Should NOT show ISP DNS
# Should show Tor network DNS

# Or CLI test:
nslookup example.com 127.0.0.1
# Should resolve through Tor (if configured correctly)

Comparison: Tor vs I2P vs Lokinet

Feature Tor I2P Lokinet
Audited Yes Partial No
Maturity 20 years 15 years 2 years
User base 2M+ 50k+ 10k+
Speed Slowest Medium Medium
Anonymity Best Very good Good
P2P optimized No Yes Yes
Public docs Excellent Good Minimal
Community Large Small Very small
Recommended? Yes For P2P Emerging

Built by theluckystrike — More at zovo.one