Tor, VPN or Proxy – Which is Right for You?

Records of an average person’s browsing history may not be worth much, but when you add every citizen of the U.S. to the equation, the value becomes millions of dollars.

ISPs want your personal data so they can sell it to the highest bidder or find ways to upsell you. Advertisers and titans of Web search want to track your online activity so they can display products you’re most likely to be interested in. Finally, governments want access to your online activities, in case they find a reason to monitor them.

These players are becoming a bigger threat to your online privacy by the day, and it’s about time you stood up to this menace. It starts by protecting yourself, namely with Tor, a VPN, or a proxy.

There’s no perfect solution, however, it should be said they’re not all in the same league either. So, let’s look at the pros and cons of each of these technologies.

Tor

What is it?

Known as “the onion router,” Tor is free software that allows you to join their anonymity service. Tor directs traffic through a network of thousands of relays run by volunteers around the world. It makes it very difficult if not impossible for someone to monitor your online activity, and also prevents site owners from seeing your true location.

Over the years, Tor Browser has become the main focus of the Tor Project. It integrates Tor’s technology with a Web browser, making it straightforward to use. Tor Browser requires no setup. However, it won’t hide your activities in other apps such as email, FTP, torrent client, etc.

Only accomplished tech aficionados should tackle their Expert Bundle which is the standalone flavor of Tor. It allows you to manually configure programs to work with it.

Pros

  • Not only is Tor free software, but it’s also a free service which is amazing.
  • Tor Browser is easy to use.
  • Tor Expert bundle allows you to hide your IP address on apps beyond your web browser.

Cons

  • In terms of speed, expect varying degrees of slow. Considering all your browsing data is bouncing around various relays worldwide, it’s understandable why. The other reason is advancements in the network and software are dependent on altruistic contributions, which are short in supply.
  • Since launching in 2002 it has created a reputation for being a favored tool of cyber criminals, spammers, and dissidents. Attempts to hide yourself with it can backfire as Tor users are viewed with suspicion. It can be a red flag for services, businesses, or organizations that can detect its use.

Visit the Tor Project site.

VPN

What is it?

A VPN extends a private network across a public network. It acts as a fast, secure bridge between your computer and the internet, encrypting your data as you browse the web.

With a VPN enabled, websites you visit and prying eyes online can’t see your real IP address. Instead, they’ll see the IP associated with the VPN service. VPNs also allow you to bypass geographic restrictions by allowing you to assume an IP associated with a different country.

VPN access is a service, and just like internet access, you’ll be billed monthly to use it.

Pros

  • Paid service so servers are robust, reliable, and fast.
  • Quality VPN services have huge networks of servers located around the world.
  • Used for professional applications by IT professionals. VPN users are generally granted more trust than Tor or proxy users.
  • Services offer extensive software for use with any OS (desktop or mobile) and with any application.

Cons

  • You need to subscribe to a service with an associated monthly fee.
  • Some companies block their users from accessing services with a VPN.
  • Premium VPNs are generally fast, but using a VPN might cause weaker performance in highly demanding applications such as online gaming.

View a comparison of top VPNs.

Proxy

What is it?

Before VPNs exploded in popularity, proxy servers, and web proxies were the go-to method for hiding your identity. Similar to a VPN a proxy is a gateway between your home network and a public network such as the Internet.

When viewing lists of proxy servers published online, you’ll come across three types: anonymous, elite, and transparent. Basically, the slower the proxy type, the more secure the connection. So transparent is the fastest, and the least secure. Anonymous is in the middle, and elite is the most secure. An elite proxy even tries to hide the fact you’re using a proxy, but it’s the slowest type.

Unlike VPNs which allow you to set up one centralized app that will anonymize all your activity no matter which application you’re using; proxies require extensive configuration. You’ll need to learn the the proxy options well in each app as you’ll likely need to change servers often in search of a solution with decent speeds.

Many companies see proxies as legacy technology and have removed its support from their software to focus on VPN features.

Pros

  • Both free and paid proxies are available although most will want a VPN if they choose to pay.
  • Free proxy lists are plentiful, many of which are checked continuously to ensure the list is fresh and that the proxies are indeed online.

Cons

  • Free proxy servers are run by individuals, not companies that operate with at least some ethical standards.
  • Free proxies are used and abused by spammers and malicious users so you may find the proxy server IP is banned by the site you wish to use.
  • Each app is configured separately with proxies. This can be time-consuming and frustrating due to the likely need to change your proxy server often.

View a free proxy list.

The Final Verdict

Free proxies and Tor are fine for dabblers. However, if you wish to hide your identity on an ongoing basis, you’ll probably lose patience with the unreliability, slow speeds, or hoop-jumping (in the case of proxies) associated with these methods.

The top VPN services recommended here on LetMeBy are fast, trustworthy, and generally the best option for nearly everyone. The only downside is you’ll need to pay for it, but since most VPNs are so fairly priced, this isn’t much of a drawback.

Photo: Ed Ivanushkin

Privacy-Respecting Search Engines That Don’t Track Your Activity

Chrome calls it Incognito Mode. In Firefox and Safari, it’s Private Browsing, while Microsoft Edge labels it InPrivate. People are demanding better privacy online, and big tech companies have made their moves to cater to that need through their browsers.

However, local privacy on your computer or device and online privacy are two very different things.

It’s easy to presume that your online activity is hidden when private browsing modes are enabled, but in reality, that isn’t the case. The privacy changes occur on your end (regarding cookies, history, etc.), while data is still collected by the sites you visit.

The Search for the Best Online Privacy

The most reliable way to stop search engines and apps such as Google, Bing, Facebook, and TikTok from tracking your usage is to stop using their services altogether.

Undoubtedly, smaller search engines that deliver better privacy have other shortcomings.

You need to say goodbye to personalized experiences based on past activity. The ability to log in and customize your settings for future visits isn’t always available. And of course, Google will typically be a few steps ahead in terms of the quality of their search results.

Nevertheless, if beefed-up privacy is what you need, it’s a small price to pay. By sticking with a major search engine when you don’t mind being tracked and using a privacy-first search engine the rest of the time, you get the best of both worlds.

So, what are the alternatives to the big dogs? Likely, many of these names will be new to you. Maybe it’s time for more people to open their minds about search engines and give the up-and-comers a chance.

1. DuckDuckGo

While your neighbour probably hasn’t heard of it, DuckDuckGo has built its name up to the point where its first option for privacy focused searchers.

Not tracking their customers’ usage in any way is DuckDuckGo’s calling card. The emerging search engine doesn’t collect your data, store it, or share it. As advertisers are notorious for using data collected from searches, this also means you won’t have to look at annoying ads for the electric lawnmower you just researched two minutes ago.

2. WolframAlpha

It’s a “computational knowledge engine,” and if that means nothing to you, it pulls from a massive database of knowledge and does its best to tailor that data based on your search. So rather than asking Web pages for the answers, WolframAlpha is a solution in itself. No, it won’t replace a traditional search engine for everything, but it sure beats Encyclopedia Britannica.

3. Startpage (by Ixquick)

Startpage trumpets itself as “the world’s most private search engine.” It takes advantage of Google search technology while tossing out the company’s privacy rulebook. There is also a proxy feature to increase anonymity even more; by enabling it none of the sites you visit can see your IP.

4. Yippy

With Yippy you can filter out results that aren’t relevant to your interests by selecting categories, using tag clouds, and sources. This may be a breath of fresh air for users that are tired of sites attempting to guess what you want all the time rather than just asking.

Yippy doesn’t track searches and doesn’t display customized ads either.

5. Swisscows

Hulbee AG, the Swiss-based software company behind Swisscows, utilizes a data cloud for a more intuitive connection to information and for quicker load times. It manages to provide intelligent, relevant results without probing its users.

By encrypting searches, Swisscows protects you against third party attacks and data leaks. It doesn’t leave any tracks when you search on the site: topics, IP addresses and personal information are not stored. And for those looking to protect themselves from the wrong side of the internet that can sometimes show its face at inappropriate times, it’s family friendly too.

6. Disconnect Search

With a little help from DuckDuckGo, plus the giants at Bing and Yahoo, Disconnect Search piggybacks on great existing search technology but doesn’t record your IP or your history.

For higher levels of security Pro (blocks trackers and malware) and Premium (masks location, IP with a VPN) services are also offered.

7. Lukol

This one is simple: it’s Google, but with a proxy server added to the chain to hide your identity. Lukol keeps tabs on fraudsters and shady sites, safeguarding you from attacks you might not see coming.

Visual learners will appreciate that results have images pulled from corresponding Web pages next to links.

8. MetaGer

Privacy comes naturally to this German outfit; every search is completed with respect for your privacy. They don’t save your IP, and the fingerprint of your browser. Cookies aren’t used nor are tracking pixels. Data is encrypted though the HTTPS protocol so your ISP can’t see your searches either.

Options to browse with a proxy or through the anonymous TOR network are available to those willing to put in the effort.

Photo: jpbr

Social Media Isn’t Safe and McAfee Has a Solution

As the way we use the internet evolves, so do the tactics of hackers and scammers. More and more, social media is becoming the preferred channel for the bad guys.

It’s a goldmine for them because it’s where the eyeballs are at. As of 2024, there are over 5 billion social media users in the world. On average, people spend 2 hours and 23 minutes on social media apps per day.

Security software suites protect you from the type of threats that have been around for many years such as phishing and scam websites. Protecting people on social media has been a blind spot for software developers.

It’s only recently that companies like McAfee have stepped up their games and offered a solution developed to deal with the pitfalls of social media specifically.

As the name implies, their Social Privacy Manager allows users to adjust their privacy settings for the social media apps they use in one place. This keeps their private information out of the wrong hands. It’s a proactive approach, and a step forward for making online privacy accessible.

It won’t protect users from scams and deceptive content that continue to be a widespread problem on social media. Only awareness and continued education can boost one’s safety in this regard.

Security Software is Adapting

Big tech companies have given people the tools to manage their online privacy, but the reality is not enough people are taking advantage of them.

If you use Facebook, Instagram, TikTok, X (formerly Twitter), and YouTube, that’s five places to adjust privacy settings alone.

Additionally, apps change their menus to manage privacy settings all the time. You can start following a guide online to tweak your privacy and find that how they’ve organized and labeled the options has shifted.

McAfee’s idea to simplify changing privacy settings by giving people presets and the ability to make changes across many apps at a time solves a timely challenge for people who value online privacy.

McAfee’s Social Privacy Manager: The Start of Something Big?

Nearly everybody uses smartphones and social media, but most people aren’t geeks when it comes to configuring their social media apps.

The reality is maintaining better online privacy needs to be easy, or most people won’t find the time for it. Although people have mastered the basic functions of apps, privacy settings are known territory for many.

There isn’t one approach to privacy for all that’s right for all people. That’s why McAfee allows users to describe their usage, from names ranging from ‘unplugged’ to ‘socializer.’ This allows users to change their privacy settings across platforms with a few clicks so they can quickly get back to being entertained and educated.

To learn more about the features of Social Privacy Manager, see this blog post announcing its release.

Why Cybercrime Growing on Social Media

Apps like Facebook brought social media to the masses many years ago. Why is protecting your privacy and security on social media apps more important now than ever?

In short, cybercriminals have moved with the times.

Practically everyone has an old email address they rarely check.

Why would scammers continue to focus on email when people check apps like Instagram and Facebook several times every day? Users are more likely to engage on their favorite app, whether the content is legitimate or not.

Many have grown accustomed to phishing attempts found in their email inbox, and they’re able to identify shady websites. Spotting attacks on social media isn’t always routine because the bad actors are using new techniques.

Social media was pretty safe in comparison to other online channels in its early days. Thus, a lot of social media users have a false sense of security.

Trust is a Double-Edged Sword

Building an audience online is all about gaining trust.

For big companies like Microsoft and Apple, trust and reputation are the backbone of their business. It’s no different for the public figures you follow on social media. They also realize if they don’t have people’s trust, posting on social media won’t get them anywhere.

Nobody wants to get people’s trust more than scammers. They can cheat their way to it, but can rarely earn trust.

Scammers often pretend to be people you follow and companies you do business with because trust has already been firmly established. Once they have established a phony veneer of legitimacy, some people they reach will put their guard down and fall for their schemes. It’s a numbers game.

Traps to Avoid on Social Media

By familiarizing yourself with common pitfalls on social media you won’t be caught off guard. Education is the first line of defense.

Here are some tactics nefarious social media users have been using in recent years.

Fake Accounts Pretending to be People You Follow

Search for any popular influencer or celebrity on social media and you’ll see a genuine account and under that an avalanche of fake accounts.

Imitators use the same profile pics as the real accounts, have deceptively similar user names, and even repost content pulled from the genuine account.

These doppelgangers will typically follow accounts in an attempt to get a follow back from people who believe it’s the real person.

It isn’t clear what their objectives are at first glance. Fakers commonly send DMs containing scam offers.

Compromised Accounts Posting Scams

Influencers can post scams when their followers least expect it. This happens when an account that has gained a big following and credibility is compromised.

Attackers hijack accounts to spread their scams or endorse products that the real person would never endorse.

Sometimes influencers post content that’s off-beat or out of place when compared with their usual content. However, if a post is suspicious and pushes people to take action quickly, there’s a good chance someone managed to get into their account.

Scammers post salesy messages in this context. They add links to their offer and hope for quick results before the owner of the account discovers the post and removes it.

The Treat of Deepfakes

In the past, seeing was believing. People have used Photoshop to concoct fake images since the early days of the internet, but manipulating video footage required a high degree of skill.

Deepfake technology allows anyone to create fake video footage of influential people saying anything the creator desires. It uses deep learning to study the facial expressions, movements, and speech of its subjects.

The output is convincing on a technical level. However, for now, many of the scammers who leverage deepfakes fail to craft a message that convincingly replicates how the real person would communicate. In short, bad writing and their predatory motives give them away.

Any video that pushes you to take immediate action should be viewed with suspicion whether it’s a deepfake or not. Messages that promise the viewer some type of gain rely on the oldest trick in the book. it if sounds too good to be true, it almost certainly is.

Conclusion

McAfee’s Social Privacy Manager is an important step forward for online privacy. It’s a great idea for people who lack the time or technical chops to tweak their privacy settings on each platform.

Undoubtedly, other software developers will follow their lead.

Still, social media privacy settings alone won’t protect people from scams. Innovations that aid people in spotting bad actors and scams should be developed. If community notes can be added to fake news, so can community-driven warnings that content is believed to be a scam.

The power of community is the best way to keep people safe moving forward. Let’s build upon what’s already there.

VPNs Have Exploded in Popularity in Canada, Here’s Why

A recent VPN usage survey commissioned by NordVPN found that over one-quarter of Canadians use VPNs.

As a country, Canada landed in the top five in terms of VPN awareness too. Nearly seven Canadians in ten have heard of VPNs. Other countries with above-average awareness include the U.S., United Kingdom, Hong Kong, Poland, Singapore, Taiwan, Spain, and Brazil.

Demographics of VPN Users

If you’re wondering what the typical VPN user looks like, I’ve got you covered. They’re more likely to be male and the largest age group is between 25 and 44 years old. This group leads the way in most other countries as well.

There are two big factors intersecting here: being old enough to have a budget for the extras in life and young enough to recognize the need for better online privacy. Millennials, Gen Xers, and Xennials are right in the sweet spot.

So, getting to the main topic, why are Canadians adopting VPNs faster than countries such as France, Italy, Japan, and South Korea?

What Canadians Say About Their VPN Usage

HelloSafe surveyed Canadians across the country about their VPN usage and there are some notable differences in their results compared to NordVPN’s findings.

First things first, here are the reasons Canadians said they use a VPN:

  • To secure a Wi-Fi connection – 68%
  • To enjoy content from other countries – 36.8%
  • To hide an IP address – 31.5%
  • To avoid censorship – 26.3%

Interestingly, they found that only one in ten Canadians use a VPN at least once a week. That’s a big difference from what the study for NordVPN found. However, how HelloSafe phrased the question pushed the figure down. How many people are aware enough of their VPN usage to give an accurate response?

Although general adoption is undoubtedly higher, HelloSafe’s study could indicate that Canadians are using VPNs with a purpose in mind. While there are plenty of reasons to have your VPN enabled all the time, it’s common for people to use their VPN only when they want to achieve a specific outcome.

Reasons Canadians Should Use a VPN

Now that we’ve looked at the responses Canadians gave about their VPN usage, let’s look at the benefits in detail.

1. Safeguard Your Data

Companies and Institutions want your data to make informed decisions. Data about customers and potential customers is a valuable resource to them.

When you use online services, data about your usage and behaviours become part of a massive data set. It often happens without the user’s knowledge and their ongoing consent. Rather, the details about data collection are buried somewhere in the companies’ terms of service or privacy policy.

Additionally, malicious users and cybercriminals are always looking for ways to gain personal information to aid in their agenda.

VPNs give you a powerful way to opt out of excessive data collection which is now the norm. It protects your identity online by hiding your IP address. This makes it difficult or impossible for others to pinpoint your device and your location.

2. Get Access to Geo-Restricted Content

It’s normal for Canadians to feel left out when their favourite TV shows and movies aren’t available on streaming apps. Harry Potter, Good Fellas, and Seven are just a few examples of classic movies that aren’t available on Netflix Canada.

Canadian subscribers typically get access to less content overall than Americans on streaming sites such as Netflix, Hulu, and Amazon Prime Video. It works the opposite way too as shows like The Office and Fargo are available for streaming in Canada but not in the U.S.

Websites and apps sometimes use geo-targeting to determine which content or content libraries to display to the user. It’s annoying when music in social media posts, videos on websites, news, etc. are blocked in specific countries.

VPNs replace your IP address with a different IP located in the country of your choice. This allows you to view content intended for people in any country in the world.

3. Make Public Wi-Fi Safe

Public Wi-Fi is notorious for its slow speeds and spotty stability, but it’s security that people should be most concerned about. A survey by All About Cookies found that one in four experienced a security issue from accessing the internet through unsecured networks.

It’s best to assume the Wi-Fi you use in restaurants, hotels, or at the airport isn’t secure. That means your private data, including login credentials associated with sites you visit, is being transmitted with no encryption and could be intercepted.

Any time you use a VPN, the data being transferred from the network to your device and back is protected with the highest level of encryption.

4. Protect Your Identity When Playing Online Games

Online gaming is huge, and while it’s incredibly fun to explore digital worlds, being connected with so many other players has its risks.

Gamers have to watch out for malware, account takeover, phishing attacks through messaging, data breaches, and many other threats.

Gaming platforms like Steam and PSN collect plenty of data about their customers. While you can drill down into the privacy settings and make changes, there are certain types of data collection you might not be able to opt out of.

VPNs make it impractical or impossible for malicious gamers, gaming platforms, and third parties to see the IP address of your PC or pinpoint your location.

Looking for the Best VPNs?

It’s getting more common to see VPNs packaged with other software and services such as comprehensive online security suites. However, there’s power in choosing the best VPN for you rather than settling for solutions that try to do everything.

If you’ve never used a VPN before or are looking for a new one, have a look at LetMeBy’s top 3 VPNs.

Conclusion

There’s been a big boost in awareness and usage of VPNs. At this point, most people have heard of VPNs and they have a rough idea of what they do. Canadians are pushing forward and taking control of their destiny online.

Still, we’re in the early days in terms of leveraging privacy enhancement tools like VPNs. Canadians are using VPNs to achieve their goals but if the data from HelloSafe is accurate, most haven’t jumped in with both feet yet.

VPNs Protect You but Aren’t a Substitute for Antivirus

VPNs get a lot of praise for their ability to boost one’s privacy online. Many wrongfully assume that because VPNs hide their IP address and offer a high level of encryption, they’re protected without antivirus software.

In actuality, VPNs and antivirus software serve completely different purposes.

Although using a VPN makes it nearly impossible to determine your identity through certain means, it won’t stop other methods to get hold of your private data such as phishing.

It’s estimated that one-fourth of PCs have no virus protection. That’s a camp you don’t want to be in. Unprotected machines are 5.5 times as likely to get infected.

Cybercriminals have gotten craftier and bolder than ever. On top of that, bad actors are taking more action than ever. Cyberattacks increased 125% in 2021 compared to the previous year. And there are no signs of it slowing down.

The bad guys have adapted and so will internet users. Those who use both antivirus and VPN are being proactive and are best prepared for threats now and in the future.

How Antivirus Software Protects You Online

One of the key components of antivirus software is its database. Online threats are always evolving so antivirus software downloads the latest threat database automatically before scanning your computer.

Security software either detects threats in real-time as soon as they appear or during a scheduled or manual scan of your hard drive. If malicious code is detected it’s either quarantined or deleted.

Malware is a generic term that includes many types of harmful software such as viruses, trojans, worms, and spyware. The next category everyone needs to be aware of is phishing. This is when bad actors pretend to be legitimate companies and services to extract personal data such as login details and credit card numbers.

Security software such as Norton 360 and Kaspersky Internet Security have a comprehensive approach so you’re defended from information security threats, network attacks, phishing attacks, and spam.

How VPNs Protect You Online

Data is incredibly valuable to businesses and institutions. There’s a whole industry dedicated to it, often referred to as big data. In 2022, the big data analytics market size was estimated to be worth USD 272 billion.

Private data is also valuable to shady third parties and cybercriminals which is the most immediate threat to the average internet user.

Thus, with each passing year, it’s more and more important to be mindful of how you protect your privacy online. There are plenty of improvements you can make by drilling down into the privacy settings of the online services you use. However, companies will never give you full control of your privacy. By using a VPN, you easily and effectively level up your privacy across all the apps and platforms of your choice.

VPN is short for Virtual Private Network. Essentially, you can think of a VPN as a tunnel that encrypts all data that moves between your internet connection and your device.

It replaces your true IP address with an IP associated with the location you select. This makes it nearly impossible for people and organizations to determine who you are and where you’re located by viewing your IP address.

To learn about the top 3 VPN services recommended on LetMeBy, visit this page.

Using Both Antivirus Software and a VPN is the Best Defence

Antivirus software and VPN apps complement each other perfectly. One if your best defense against malware and the other is your best defense against companies, third parties, and organizations compiling data about you based on your actions online.

VPNs have security benefits as well as it encrypts data during transit. This protects you from attackers that aim to intercept data going to your device or network. Once the data has reached your device, it’s up to antivirus software to deal with threats.

Antivirus software is essential. This is why Windows Defender is pre-installed on any current Windows machine. VPNs have seen an incredible boost in adoption in the past several years, but not every internet user needs a VPN. Everyone can benefit from using a VPN, but you need to value your online privacy to want it.

Wide-ranging security software is becoming more common. These solutions include both antivirus and VPN software.

Is Windows Defender Enough?

You might be old, but are you old enough to remember downloading McAfee on your new PC after installing Windows XP?

Windows has come a long way since then in terms of security features. Before the release of Vista, Windows users had to get third-party antivirus to protect their computers. Today, Windows Defender is preinstalled and Windows automatically downloads and applies the latest security updates.

Windows machines don’t really need third-party antivirus software since Windows Defender is perfectly capable.

The main reason to get third-party antivirus software is you find its features compelling. For example, gamers appreciate “gaming mode” which is found in software such as Kaspersky Internet Security. By enabling it, functions such as system scans and notifications won’t interrupt your gaming experience while the antivirus works in the background.

Full security suites provide the most added value. These software packages protect you from spam, unsafe websites, shady applications, webcam breaches, and more.

Conclusion

It’s easy for Windows users. Simply add a VPN to complement the antivirus software already preinstalled: Windows Defender. This gives you protection where it matters most. Still, when something is easy, we sometimes lose sight of what’s working for us in the background. Antivirus software is essential and VPNs are in no way a replacement for it.

Online privacy and protecting yourself from malware are related and more than ever there’s overlap between the two. However, for the best solution is to use both a VPN and antivirus.