Optionally passing traffic through Cloudflare WARP makes it safer for volunteers to provide a SlipGate node open to the general public. The volunteer's server IP will not appear in the logs of final destination sites. The final destination site will see only the Cloudflare IP.
Consider also adding Tor as a backend. The client's TCP traffic is passed to Tor, which is listening on port tcp/9001. (Any other protocol would be discarded, since Tor handles only TCP). Tor then passes traffic through an entry node, middle node, and exit node to the final destination.
This makes it even safer for volunteers to provide a SlipGate node open to all-comers. It may also appeal to clients seeking some degree of anonymity.
Optionally passing traffic through Cloudflare WARP makes it safer for volunteers to provide a SlipGate node open to the general public. The volunteer's server IP will not appear in the logs of final destination sites. The final destination site will see only the Cloudflare IP.
Consider also adding Tor as a backend. The client's TCP traffic is passed to Tor, which is listening on port tcp/9001. (Any other protocol would be discarded, since Tor handles only TCP). Tor then passes traffic through an entry node, middle node, and exit node to the final destination.
This makes it even safer for volunteers to provide a SlipGate node open to all-comers. It may also appeal to clients seeking some degree of anonymity.