When using a VPN, an attacker can also break your anonymity by monitoring the incoming and outgoing connections of the few servers of the VPN. On the other hand, the Tor network is formed by over 607500 relays run worldwide by volunteers.
When using a VPN, an attacker can also break your anonymity by monitoring the incoming and outgoing connections of the few servers of the VPN. On the other hand, the Tornetworkis formed by over 7500 relays run worldwide by volunteers.
[[!img tor/tor.png link="no" class="svg" alt="A Tor connection goes through 3 relays with the last one establishing the actual connection to the final destination"]]
An extract of a Top Secret appraisal by the NSA characterized Tor as "[the King of high secure, low latency Internet anonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)" with "no contenders for the throne in waiting".
An extract of a Top Secret appraisal by the NSA characterized Tor as "[the King of high secure, low latency Internet anonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)" with "no contenders for the throne in waiting".
[I2P](https://geti2p.net/) is another anonymity networkand alternative to Tor.Tails used to include I2P until 2017. We removed I2P in [[Tails 2.12|news/version_2.11]] because it was too costly to maintain.
We have no plans to add I2P back in Tails because I2P hasn't yet become popular and usable enough to make a real difference for our [[target audience|contribute/personas]].