May 2026 • Privacy Infrastructure

Nym vs Tor: The Right Tool for a Surveillance-Heavy World

Tor protects against local surveillance. Nym protects against a global passive adversary. They are not competing tools — they solve different problems at different points on the threat spectrum.

The Threat Has Outgrown the Tool

Tor was designed in the early 2000s to protect against a specific adversary: a local ISP or government blocking and monitoring internet access. For that threat, it worked. For that threat, it still works.

But the adversary has changed. Nation-state surveillance capabilities, mass traffic correlation at internet exchange points, AI-assisted timing analysis, and the commoditisation of deep-packet inspection have produced something Tor's original designers explicitly said their system could not handle: a global passive adversary capable of observing large portions of network traffic simultaneously.

Nym was built with that adversary in mind from the first line of code.

How Tor Works — and Where It Breaks

Tor routes your traffic through three relays: a guard node, a middle relay, and an exit node. Each relay knows only the previous and next hop. The circuit is encrypted in layers — the onion model. Nobody on the path sees both source and destination.

This is strong against a passive local observer. It is weak against anyone who can correlate timing at both ends of the circuit.

The attack is straightforward. If an adversary observes packets entering the Tor network and packets exiting, they can match the timing patterns — even without breaking any encryption. The packets are not reordered. They are not delayed beyond routing latency. They are not padded to a uniform size. The traffic pattern of the user leaks through the circuit, because Tor was never designed to prevent it.

Academic literature has demonstrated this consistently since 2005. The Tor Project acknowledges it in their own documentation. Against a well-resourced adversary observing the network at scale — any agency with IX-level access — Tor's anonymity against traffic analysis is limited.

There is a second structural problem: Tor's directory authorities. A small set of servers, operated by known organisations, maintains the list of all Tor relays, their keys, and their status. Anyone who controls or compromises the directory authorities can manipulate what relays users see, deanonymise users by inserting malicious relays, or selectively block categories of users.

Additionally, Tor relays have no economic incentive to operate. Anyone can run one — including law enforcement, intelligence agencies, and adversaries specifically deploying relays to perform traffic correlation at scale.

How Nym Works

Nym implements a Sphinx-based mixnet with five-layer topology: clients connect to a gateway, traffic passes through three mixing layers, and exits through a second gateway. At each mixing node, packets are decrypted one layer, batched with other packets, held for a Poisson-distributed random delay, reordered, and forwarded.

Where Tor preserves packet timing, Nym actively destroys it. A packet entering a mix node cannot be correlated with any particular packet leaving it. The adversary watching both ends of the circuit sees noise, not signal. This holds even against a global passive adversary, provided they do not control a majority of the mixing nodes in a path.

Sphinx packets are fixed-size and uniformly padded. Metadata about packet length is eliminated at the protocol level.

Cover traffic — loop traffic, drop traffic — is generated continuously by clients and nodes. Even when you are not sending, the network looks as if you are. An adversary cannot distinguish active communication from idle presence.

The Role of the NYM Token

This is where Nym's architecture diverges most sharply from Tor — not technically, but economically.

Tor relays are operated voluntarily. The network's security depends on good faith and the assumption that adversaries will not operate enough relays to dominate the network. That assumption does not hold at scale against nation-state adversaries.

Nym mix nodes are economically incentivised. Node operators earn NYM tokens for routing packets correctly and honestly. The incentive is built into the protocol through a credential system based on zk-nym — zero-knowledge proofs derived from the Coconut credential scheme. Users obtain credentials by spending NYM tokens. Nodes verify credentials and earn rewards for processing them.

An adversary who wants to operate a significant fraction of Nym mix nodes must acquire and stake NYM tokens. This raises the economic cost of a Sybil attack by orders of magnitude compared to Tor, where running malicious relays costs only bandwidth and electricity.

The token also enables a decentralised directory. Nym's network topology is maintained on-chain. There is no central authority equivalent to Tor's directory authorities. Manipulation of the node list requires consensus on a blockchain, not compromise of a handful of servers.

NYM is not a speculative asset tacked onto a privacy project. It is the mechanism by which the network's threat model is economically enforced.

Comparison

Property Tor Nym
Routing model3-hop onion routing5-layer Sphinx mixnet
Traffic analysis resistanceWeak — timing preservedStrong — Poisson delays + batching
Packet size uniformityVariableFixed (Sphinx, 2KB)
Cover trafficNoneContinuous loop + drop traffic
Node incentiveVoluntaryEconomic (NYM token rewards)
Sybil resistanceLow — free to run relaysEconomic cost to stake nodes
Directory / topologyCentralised authoritiesOn-chain, decentralised
Global passive adversaryVulnerableResistant by design
LatencyLow — suitable for browsingHigher — suitable for messaging

Which One to Use

Tor is the right tool when your threat model is a regional or national censor — not a global signals intelligence agency. For accessing blocked websites, circumventing national firewalls, or protecting against a local ISP: Tor is excellent and battle-tested.

Nym is the right tool when your threat model includes mass surveillance infrastructure, traffic correlation at scale, or adversaries with IX-level visibility. For journalists communicating with sources, activists in high-surveillance environments, or anyone whose identity could be inferred from the pattern of their communications — not just their content — Nym's mixnet guarantees hold where Tor's do not.

The mistake is assuming Tor is sufficient for all threat models because it handles the most common ones adequately. The world has not gotten less surveilled since 2003. The right tool has changed.


We run Fog, a Sphinx-based anonymous SMTP relay, and YAMN, a Type-II anonymous remailer over Tor. Both are open for peering.