Privacy
Protect your privacy in the digital world
Welcome! This is a community for all those who are interested in protecting their privacy.
Rules
PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!
- Be nice, civil and no bigotry/prejudice.
- No tankies/alt-right fascists. The former can be tolerated but the latter are banned.
- Stay on topic.
- Don't promote big-tech software.
- No reposting of news that was already posted. Even from different sources.
- No crypto, blockchain, etc.
- No Xitter links. (only allowed when can't fact check any other way, use xcancel)
Related communities:
- !opensource@programming.dev
- !selfhosting@slrpnk.net / !selfhosted@lemmy.world
- !piracy@lemmy.dbzer0.com
Is This Safe for Me? Yes
I think the answer is not so simple. For example, some might think it would be a bad idea for their provider to know that you regularly exchange traffic with many users in adversarial countries (even if they don't know what that traffic is)... could that be used against you somehow? It's entirely possible.
You are completely right. That was worded poorly and a few users have thankfully pointed that out. The answer, for most people, is yes. But that depends entirely on your threat model.
The traffic to your Snowflake proxy isn't necessarily from people in 'adversarial countries'. A Snowflake proxy is a type of bridge, so just about anyone can use it. You can use a Snowflake bridge, if you want. However, it is strongly encouraged to save bridges (including Snowflakes) to people who need them.
So, for most people, it is generally safe to run Snowflake proxies. Theoretically, your ISP will be able to know that there are connections being made there, but, to them, it will look like you're calling someone on, say, Zoom since it uses WebRTC technology. They can't see the data, though since everything is encrypted (check the Snowflake docs and Tor Brower's for further reference). You probably won't get in any trouble for that.
Historically, as far as we know, there haven't been any cases of people getting in legal trouble for running entry relays, middle relays, or bridges. There have a been a few cases of people running exit nodes and getting in trouble with law enforcement, but none of them have been arrested or prosecuted so far.
If you know of any, let me know.
It's encrypted, but if they access a dark web site anyone will still know that you, the host, passed data to that dark web site right? Even if they can't see what, they know you were involved
No. That has to do with how the Tor network works. The bridge forwards the connection to a non exit relay. You do not communicate with an exit relay whatsoever. The middle relay does, but the exit relay doesn't know who are are and you don't know who the exist relay is.
I'd like to add that Psiphon (which also helps people in countries like mine evade censorship) has also made a similar mechanism. Please help them if you can as well.
Run one (SnowFlake) in my FireFox
Is this running correctly? I don't see any download traffic, but doesn't the user need to send a request for a webpage that would get passed through me, which would get "downloaded" to Orbot, then gets forwarded to the Tor Network, right? I'm not sure if this is working properly...