Reimplementing Tor From Scratch For A Single-Hop Proxy
Summary
A detailed, code-heavy exploration of attempting to reimplement Tor for a single-hop proxy, including handshakes, cryptography, and a critique of the feasibility and anonymity implications. The author documents the architecture, build process, and a benchmarking comparison, while noting security and policy considerations about running exit/relay nodes.