zlacker

[return to "Reimplementing Tor from Scratch for a Single-Hop Proxy"]
1. fishgo+AN9[view] [source] 2026-02-04 05:26:19
>>Agreed+(OP)
So the author doesn't want to cough up the money to buy a VPN but will instead write a custom Tor client that is intentionally weak on anonymity so they can run their own exit node on a VPS they bought. Why not setup Wireguard and use the VPS as a VPN? More power to them, seems like they learned some things and are happy with the results, I just don't get it though.
◧◩
2. rendx+8ha[view] [source] 2026-02-04 09:39:41
>>fishgo+AN9
If you have time on your hands which is basically free for you, and you run the relay at home too, there's no extra cost involved. You don't need a VPS to run a (non-exit) relay. Even if you do, the VPS will be associated with you much more directly than a third party exit, which is unlikely set up to log IPs. The VPS IP might even be publicly associated with you, if you use it e.g. also for web hosting. And Tor allows you to pick the exit location, like VPN services often offer different locations.

And could it possibly be that people exist that do things for pure enjoyment of the exercise? Looks like they learned quite a bit throughout the process. In practical terms, this may even land them a job at Tor (or elsewhere) later, since they can demonstrate that they understood what it is doing and where to find the relevant pieces of information to "circumvent" the protection.

[go to top]