Tor VPN Threat Model

This document provides insights into the security characteristics of Tor VPN, describes the nature of the benefits that Tor VPN provides and when they apply. The intended audience for this threat model document includes developers, UX designers, documentation writers, technical trainers, and technical users.