this post was submitted on 24 Aug 2023
125 points (97.7% liked)

linuxmemes

21163 readers
151 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     

    for those who don't know:

    snowflake is a project by TOR that allows people to access censored services. Anyone can run a snowflake proxy. I'm using their firefox extension. more details here: https://snowflake.torproject.org/

    you are viewing a single comment's thread
    view the rest of the comments
    [–] _hovi_@lemmy.world 1 points 1 year ago (1 children)

    I have almost no knowledge on this topic but if it's just their request going through your computer, is that not how vpns work? Also what happens if they're searching illegal topics in your region, like criminal stuff, I'd assume you could get in trouble for that?

    [–] mexicancartel@lemmy.dbzer0.com 1 points 1 year ago (1 children)

    I said "triple layered vpn" because its somewhat like a vpn. But triple layers means the other person is accessing the internet through your computer and also through other conputers as well so that you cannot compromise the anonymity of the user because you are only one in three nodes. If you are end node, you can get info about the sites they visit but no information about who they are(not even ip because only first node gets that). The first node can see who you are but does not know what sites you visit(only third node knows that) and second node does not know about both of theese but has the information to identify the two end nodes and also makes sure that first node does not know the last node.

    [–] _hovi_@lemmy.world 1 points 1 year ago (2 children)

    Ok I see, so running this is basically like running a Tor node, with the same risks involved as well?

    Snowflake is for places where the tor network itself is blocked. You can uncensored internet with tor but if tor is blocked, you have to use some bridges to connect to tor network. But bridges needs to be configured and people who host bridges have some expense to keep it online. Snowflake is a temporary bridge which anyone can enable anytime and stop anytime. People who tries to connect through snowflake can easily connect automatically to any active snowflake proxies and also find a new snowflake proxy when current one goes offline.

    Here is the official note about it