Hi all,

If bridges users configure at least two bridges in different /16s,
it makes it harder to run some kinds of statistical attacks on the
paths that they build through the Tor network. (For example,
working out that relays in that /16 are never used by the client.)

For context, see this Twitter thread:
https://twitter.com/twbtwb/status/943974051000721408

I think that:
* most of the current default Tor Browser bridges are in at least two
   /16s, except for the single-bridge pluggable transports,
* almost all the 3-bridge sets given out by BridgeDB are in at least
   two /16s.

Should we:
* document this as a recommendation? Where?
* add code to Tor that warns when it isn't true? (Maybe not?)
* make sure all of the Tor Browser bridges are across two or
  three /16s?
* make sure BridgeDB gives out bridge sets in two or three
   /16s?

T