this post was submitted on 24 Aug 2023
125 points (97.7% liked)
linuxmemes
21163 readers
151 users here now
Hint: :q!
Sister communities:
- LemmyMemes: Memes
- LemmyShitpost: Anything and everything goes.
- RISA: Star Trek memes and shitposts
Community rules (click to expand)
1. Follow the site-wide rules
- Instance-wide TOS: https://legal.lemmy.world/tos/
- Lemmy code of conduct: https://join-lemmy.org/docs/code_of_conduct.html
2. Be civil
- Understand the difference between a joke and an insult.
- Do not harrass or attack members of the community for any reason.
- Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
- Bigotry will not be tolerated.
- These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
3. Post Linux-related content
- Including Unix and BSD.
- Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of
sudo
in Windows. - No porn. Even if you watch it on a Linux machine.
4. No recent reposts
- Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
Please report posts and comments that break these rules!
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I have almost no knowledge on this topic but if it's just their request going through your computer, is that not how vpns work? Also what happens if they're searching illegal topics in your region, like criminal stuff, I'd assume you could get in trouble for that?
I said "triple layered vpn" because its somewhat like a vpn. But triple layers means the other person is accessing the internet through your computer and also through other conputers as well so that you cannot compromise the anonymity of the user because you are only one in three nodes. If you are end node, you can get info about the sites they visit but no information about who they are(not even ip because only first node gets that). The first node can see who you are but does not know what sites you visit(only third node knows that) and second node does not know about both of theese but has the information to identify the two end nodes and also makes sure that first node does not know the last node.
Ok I see, so running this is basically like running a Tor node, with the same risks involved as well?
Snowflake is for places where the tor network itself is blocked. You can uncensored internet with tor but if tor is blocked, you have to use some bridges to connect to tor network. But bridges needs to be configured and people who host bridges have some expense to keep it online. Snowflake is a temporary bridge which anyone can enable anytime and stop anytime. People who tries to connect through snowflake can easily connect automatically to any active snowflake proxies and also find a new snowflake proxy when current one goes offline.
Here is the official note about it