When using a VPN, an attacker can also break your anonymity by monitoring the incoming and outgoing connections of the few servers of the VPN. On the other hand, the Tor network is formed by over 607500 relays run worldwide by volunteers.
When using a VPN, an attacker can also break your anonymity by monitoring the incoming and outgoing connections of the few servers of the VPN. On the other hand, the Tor network is formed by over 7500 relays run worldwide by volunteers.
Tor is the anonymity network with the largest user base. More than 24 000 000 users connected to Tor daily in 201923. Being adopted by such a large audience proves its maturity, stability, and usability.
Tor is the anonymity network with the largest user base. More than 4 000 000 users connected to Tor daily in 2023. Being adopted by such a large audience proves its maturity, stability, and usability.
18
An extract of a Top Secret appraisal by the NSA characterized Tor as "[the King of high secure, low latency Internet anonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)" with "no contenders for the throne in waiting".
An extract of a Top Secret appraisal by the NSA characterized Tor as "[the King of high secure, low latency Internet anonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)" with "no contenders for the throne in waiting".
[I2P](https://geti2p.net/) is another anonymity network and alternative to Tor.Tails used to include I2P until 2017. We removed I2P in [[Tails 2.12|news/version_2.11]] because it was too costly to maintain.
We have no plans to add I2P back in Tails because I2P hasn't yet become popular and usable enough to matter to our [[target audience|contribute/personas]].