This isn't how the current Tor2web implementation works. If your proposal will
break the Tor2webRendezvousPoints option, or require a minimum number of
relays to be specified in that option, you need to document these implementation
changes or new configuration constraints clearly in the proposal.
I'm not sure whether different Tor2web web clients get different hidden service
circuits. But as it's critical to the correct functioning of this proposal with Tor2web
mode, I'd encourage you to find out, and update the proposal accordingly.
This isn't how Tor2web mode works. If your proposal needs the design to be
changed, then please document that.
So the number of rendezvous points required in Tor2webRendezvousPoints
depends on the load on the particular hidden service, the number of web
clients connecting to the particular hidden service via the Tor2web instance,
and whether those clients get the same rendezvous circuit or not.
Such a non-deterministic requirement essentially breaks the
Tor2webRendezvousPoints feature.
That's precisely why the option exists. Tor2web clients can choose a
or same network. This increases the speed of Tor2web connections.
precisely than picking a random rendezvous point.