What a VPN does is take the encrypted traffic from the client, decrypt it and forward it to the server, while tor bounces the traffic in multiple nodes decrypting a layer at each node.
I have some questions about the security of these systems:
Regardless of whether the VPN holds traffic logs or not, an entity that has the power to do so can not request logs from the ISP, and even if it gets inbound encrypted traffic, it compares the size of incoming traffic and the outgoing one and see which one matches? Once you understand what inbound traffic is, you can get the IP of the affected client, right?
This same thing can not be done with tor even if it requires more steps?
If a private VPN is used, then there is only 1 user connected, getting the incoming logs you only see a connection, so even without correlating the size of the packages, you can easily understand who is connected to the VPN and being the only one that was done with the IP of the VPN he did it, so the private VPNs is less anonymous than the public trusted ones, right?
This question may seem similar to the others, but I do not think, the other questions are shown how the solution could be tor, but the problem seems to me that there is also with tor, later I would like understand if it is true that private VPNs are much safer than public ones, in short, I think my question is more general, I'm sorry for the bad english, but I help me with the translator. And my question has nothing to do with Differences between using Tor browser and VPN