Bridge node wil be exposed by malicious middle nodes.
If a TCP stream from a bridge traverses malicious Tor middle routers, the bridge will be exposed.Why the client of bridge do not use Vangards? that pin the middle nodes into a small set.
Trac:
Username: TBD.Chen