[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #33047 [Circumvention]: How can we optimise the anti-censorship suite for mobile?



#33047: How can we optimise the anti-censorship suite for mobile?
-------------------------------+--------------------
     Reporter:  phw            |      Owner:  (none)
         Type:  task           |     Status:  new
     Priority:  Medium         |  Milestone:
    Component:  Circumvention  |    Version:
     Severity:  Normal         |   Keywords:
Actual Points:                 |  Parent ID:
       Points:                 |   Reviewer:
      Sponsor:                 |
-------------------------------+--------------------
 Mobile applications have significant space constraints, which makes it
 difficult to bundle Tor and its circumvention suite.  For example,
 obfs4proxy 0.0.7 in Debian Buster currently has a binary size of 5.2 MB
 and snowflake-client in Tor Browser 9.5 has a binary size of 7.7 MB. This
 is largely due to both projects being implemented in golang, which only
 supports static linking.

 What can we do to reduce our circumvention suite's disk footprint? The
 obvious answer would be to re-implement obfs4 and snowflake in a
 dynamically-linked language. What else can we do?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33047>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs