You're doing the lord's work!
Tor is crucial for me as one in these countries. Thanks OP :)
PS: I'll pin this, unless @[email protected] or anyone else dislikes the choice.
Welcome! This is a community for all those who are interested in protecting their privacy.
~PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!~
You're doing the lord's work!
Tor is crucial for me as one in these countries. Thanks OP :)
PS: I'll pin this, unless @[email protected] or anyone else dislikes the choice.
This is going into the wiki and you know it
That's great news! I'd love for it to be added to a wiki. Just make sure that whatever version of this post is added to the wiki is the most updated one.
I'll make sure it is updated, no worries
Awesome
Is This Safe for Me? Yes
I think the answer is not so simple. For example, some might think it would be a bad idea for their provider to know that you regularly exchange traffic with many users in adversarial countries (even if they don't know what that traffic is)... could that be used against you somehow? It's entirely possible.
You are completely right. That was worded poorly and a few users have thankfully pointed that out. The answer, for most people, is yes. But that depends entirely on your threat model.
The traffic to your Snowflake proxy isn't necessarily from people in 'adversarial countries'. A Snowflake proxy is a type of bridge, so just about anyone can use it. You can use a Snowflake bridge, if you want. However, it is strongly encouraged to save bridges (including Snowflakes) to people who need them.
So, for most people, it is generally safe to run Snowflake proxies. Theoretically, your ISP will be able to know that there are connections being made there, but, to them, it will look like you're calling someone on, say, Zoom since it uses WebRTC technology. They can't see the data, though since everything is encrypted (check the Snowflake docs and Tor Brower's for further reference). You probably won't get in any trouble for that.
Historically, as far as we know, there haven't been any cases of people getting in legal trouble for running entry relays, middle relays, or bridges. There have a been a few cases of people running exit nodes and getting in trouble with law enforcement, but none of them have been arrested or prosecuted so far.
If you know of any, let me know.
It's encrypted, but if they access a dark web site anyone will still know that you, the host, passed data to that dark web site right? Even if they can't see what, they know you were involved
No. That has to do with how the Tor network works. The bridge forwards the connection to a non exit relay. You do not communicate with an exit relay whatsoever. The middle relay does, but the exit relay doesn't know who are are and you don't know who the exist relay is.