How can we optimise the anti-censorship suite for mobile?
Mobile applications have significant space constraints, which makes it difficult to bundle Tor and its circumvention suite. For example, obfs4proxy 0.0.7 in Debian Buster currently has a binary size of 5.2 MB and snowflake-client in Tor Browser 9.5 has a binary size of 7.7 MB. This is largely due to both projects being implemented in golang, which only supports static linking.
What can we do to reduce our circumvention suite's disk footprint? The obvious answer would be to re-implement obfs4 and snowflake in a dynamically-linked language. What else can we do?