Goal: We (Whonix) are researching optional bridge hosting for our users to thwart web fingerprinting. Snowflake makes the most sense since no NAT hole-punching is needed. Correct me if I'm wrong here because if that was possible with obfs4 or meek it would save a lot of work.
We now know acting as a bridge makes the user act as a guard node and not just a rendezvous to one.[1]
[1] https://tor.stackexchange.com/questions/3636/what-is-the-relationship-betwee...
Some questions to help with implementation:
* Do the user's own data go through just two hops as well or are they sent to the guard node they chose before deciding to run as a bridge? How do configure Tor to do the former if it isn't?
* Are there plans to create signed debs for snowflake client/server so we can use it with Debian's tor daemon? * Do Tor Browser bundles with the snowflake addon also include the server component?
* Do Alpha bundles have this code yet?
* When are these bundles expected to arrive to stable?
* Is it possible to interact headlessly with the snowflake server component via commandline? How?
* How can we run TBB headlessly so users don't mistakenly interact with it on the gateway?