I didn’t know GoTenna used UDP.
Yeah, UDP would be a problem - but I would think the normal workarounds would be sufficient to handle that difficulty. Just placed a phone cal through Tor using my presumably UDP softphone, and others report same with Skype: Voice over Tor? - Guardian Project
So it’s not like others haven’t dealt with this problem…And while I never bothered to learn the envelope of Wireguard. Would expect it can tunnel UDP. Wireguard puts a trivial load on systems…it just behaves.
The attractiveness of Tor to host this node is the ease of creating fully functional onion sites. I’m sure you’ve used Onionshare. And I’m assuming even onionshare can be further enhanced with the addition of the Tor access cookie. Let’s say a school district needed to communicate with dispersed schools. They could just setup an onion site, then distribute that security cookie. Thereafter, only their staff could access that onion website.
I’m hoping one could do something similar with Gotenna. Create a virtual relay or relays on a server - then have dispersed Gotenna segments connect to it using their native protocol. This system could be open (available to anyone) or closed (available only to a school district).
An I2P virtual Gotenna might even be more advantageous since I2P supports UDP natively. I just thought Tor would be quicker to implement.
Onions and EEPsites are just easier. They require no grand poobahs to deploy.