This is a matter of curiosity more than of practicality, but would it be possible for a hypothetical manufacturer (hereinafter referred to as International Company Of Mystery or INCOMOM) so inclined to bundle a functioning TOR node, or the capability to turn the users computer into a node, into their usb products without the average power user realizing?
I think "power user" is both vague enough to be somewhat unhelpful, and open enough that someone more knowledgeable than I could answer to a more useful specific case.
e.g.: USB mouse needs a configurator to run properly, with this configurator itself operating the node. Could this approach be used to mask traffic?
Would this work? Would it actually provide any tangible benefit to INCOMOM, as well intentioned as they clearly are?
The only thing I can imagine being a benefit would be increased traffic on the network making it harder to have sufficient precision in timing at exit nodes when attempting to track an individual (the mechanics of which I know little about). I'm guessing that would require these devices to both function as a node and utilize the network in order to create the additional traffic. Would that actually work?