you are correct that this is not really the right place to get a good
response as there is nothing Qubes-specific about this topic, the Tor
community would make much more sense.
The Tor Project just came out with a new community portal that has more
information about running Tor relays (in your particular case, bridges):
https://community.torproject.org/relay/
https://community.torproject.org/relay/types-of-relays/
here is a community effort to make setting up a server to use as a Tor
bridge simpler:
https://github.com/StreisandEffect/streisand/
there are certainly other similar projects on github as well.
it sounds like you are interested in reading more about pluggable
transports, which are the different strategies for obfuscating the
initial hop to the Tor network:
https://www.pluggabletransports.info
for example, in China the "meek" pluggable transport still works:
https://www.pluggabletransports.info/transports/
some of these transports are included in Tor Browser so that a user can
still circumvent some censorship mechanisms without the need to create a
private bridge.
The Tor project "will not publicly agree to help create this project"
because it is clear you are just learning about these topics and the
first step should be to research more to understand the issues better,
through which you will find that many people within the Tor community,
in academia, & beyond are actively working on these topics and there is
already functionality within Tor Browser that takes these issues into
account. Because China and some other countries actively work on new
methods to identify and block such initial hops, it will continue to be
a topic for research & development for the foreseeable future.
--
Michael Carbone
Qubes OS |
https://www.qubes-os.org
@QubesOS <
https://www.twitter.com/QubesOS>
PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4