Hey,

Thanks for sharing your idea.

That said, there are a few big issues with your proposal:

1.) Centralization of trust: Giving a fixed group of “original volunteers” 
special relay status adds centralized points of trust and failure. Tor has 
always aimed to avoid that — no single group should be in a position to 
de-anonymize users.

2.) The concept still exposes the IP somewhere: Replacing the guard with a 
“shield” doesn’t really solve the problem — it just moves it. The shield would 
now see the user’s IP instead of the guard, so we’re back to the same trust 
issue, just in a different spot.

3.) "Hard-coded" nodes are risky: If we hard-code a set of shield nodes, they 
become easy to block or target. And if any of them go down, users could lose 
access or hidden services could get de-anonymized.

4.) More latency: Adding an extra hop (shield → guard → middle → exit) makes 
the whole system slower and more complex, without clear benefits to anonymity.

In a way, using a Snowflake bridge already does this according to my knowledge, 
as long as it is running as a Firefox plugin (which then proxies traffic to the 
"guard").

5.) Exclusion and scalability: Restricting shield operation to only a small 
historical group doesn’t scale well and could create unnecessary gatekeeping. 
It also means we’d be relying on fewer people, which weakens the network.

6.) As mentioned above with Snowflake, censorship resistance is already handled 
elsewhere.

Obfuscation for censored users is already addressed through pluggable 
transports like obfs4, meek, snowflake, etc. These are designed to be dynamic 
and hard to detect — hardcoded nodes would be a step back.

In short: it’s a well-meaning idea, and the concerns behind it are valid - but 
the approach would likely introduce more problems than it solves. The current 
design of Tor reflects a lot of hard lessons about trust, decentralization, and 
threat modeling that we’ve learned the hard way over the past few years.

Thank you,

- George

On Wednesday, July 16th, 2025 at 11:45 AM, Khaled Roomi via tor-dev 
<tor-dev@lists.torproject.org> wrote:

> Hi tor, I wanted to contact you about an idea I want to share with you. My 
> idea is making all the original volunteers (who were in the project since the 
> project begun) run a new relay, it’s like some sort of shield. And no one 
> else other than the volunteers can make that shield node. The tor client is 
> hardcoded to connect to one of the shields the volunteer is running, then the 
> shield connects to the guard then middle then exit. It improves anonymity by 
> hiding the IP address of a user from the guard because law enforcement can 
> make relays too. And since the client will only connect to the shields 
> provided from the volunteers there’s no way that law enforcement or any 
> criminal can see someone’s IP. And for people in censored countries 
> volunteers should also run shields that obfuscate network traffic so ISPs 
> wont catch people trying to connect through tor. Tor browser would become 
> slower but more anonymous. And that’s my idea, I hope you guys are safe and 
> goodbye.
> _______________________________________________
> tor-dev mailing list -- tor-dev@lists.torproject.org
> To unsubscribe send an email to tor-dev-le...@lists.torproject.org

Attachment: publickey - hartley_george@proton.me - 0xAEE8E00F.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org

Reply via email to