this post was submitted on 10 Mar 2026
97 points (98.0% liked)

Privacy

47048 readers
1078 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

I have been using it for more than a week and now am worried about the consequences that I am not sure are true or not!

I am worried that by allowing random users to surf using my network to prevent surveillance, someone will use my address to do malicious things, and I will get into legal consequences. Also, what if many services blacklist my IP address so eventually I get a lot of restrictions in my browing experience.

Furthermore, will this extension increase my fingerprint?

Are these thoughts valid, or am I just overthinking? If anyone knows, please comment.

top 25 comments
sorted by: hot top controversial new old
[–] pineapple@lemmy.ml 61 points 1 day ago* (last edited 1 day ago) (1 children)

You cannot get into legal trouble for snowflake afaik. Its only a bridge, not an exit node. This means that websites the other person visits will see the exit nodes public ip, not yours.

Running a vpn for snowflake will only slow down the other persons connection without giving you much better security.

If it helps I've been running snowflake on my main browser for about a year now with no issues (not saying this is definitive proof for anything though.)

[–] FG_3479@lemmy.world 4 points 15 hours ago

Can the ISP see the websites the other person is visiting?

[–] portnull@lemmy.dbzer0.com 40 points 1 day ago
[–] pcouy@lemmy.pierre-couy.fr 34 points 1 day ago* (last edited 1 day ago)

This lets people use your computer as an entry point into the Tor network and camouflage the traffic as a video call between you and them (if the regular, publicly known, entry nodes are blocked by their ISP or gouvernement). The snowflake extension will then forward people's traffic through the Tor network, and services they use will only see a tor exit node's IP, not yours. As long as you trust Tor to be secure and anonymous (I personally have very high trust in its guarantees), you don't have to worry about legal consequences or being blocked by services.

I used to run a few (public) tor relays (entry or middle nodes, not exit ones), including one from my home network and IP. Never had any issue except for one service which blocked everything that had anything to do with Tor. I reached out for their admin, who claimed Tor users can show up with any node's IP (which they definetly can't, only exit nodes will forward traffic to the regular internet)

[–] LurkingLuddite@piefed.social 11 points 1 day ago

Everyone is focused on the exit, when clearly there is still a vulnerability to the entrance side. If someone is identified as a bad actor, you do not want your own personal address showing up all over in the logs of who they've been conversing with... Regardless of what can be proven as to the nature of conversations, you will now have eyes on you.

So yes, a VPN is useful, just not for all the reasons the comments so far are addressing.

[–] dwt@feddit.org 8 points 1 day ago (2 children)

Definitely possible to get into legal consequences in Germany, because we have a law that makes you responsible for actions of strangers on your network. That’s why we front clubs /associations (not sure how to properly translate that) to take the legal risk for this.

For example freifunk e.v. http://freifunk.net/

Someone else will have to comment for the legal situation in the us though.

[–] M1k3y@discuss.tchncs.de 18 points 1 day ago (1 children)

Snowflake is different though, because you just forward encrypted traffic from users into tor. Your just a bridge from one network into another and don't send any malicious data data to random servers. Only the exit nodes have that legal issue.

[–] obinice@lemmy.world 1 points 1 day ago (2 children)

Functionally it may be different, but if I'm sat at a table with another user, next to a criminal gun salesman and their customer, the salesman passes me a gun, and I pass the gun to the other user, who then passes it to the customer, am I not just as guilty of facilitating that illegal exchange?

I understand that one could try to make that argument aimed at an ISP or internet infrastructure in general, but in this case the added element is that we are individuals, we know people are often using these services for illicit means, and we still choose to facilitate their use.

Honestly I don't know if I agree with my own argument 100%, but it's something someone could argue, and it's worth some thought before deciding to become a part of that shadowy community. Especially knowing there's a good chance at some point you're a willing link in the chain for criminal activity, even if it probably can't be traced back to you.

Hmm, food for thought I suppose.

[–] bright_side_@piefed.world 4 points 1 day ago

I think what you're writing is true, though that is the legal/moral part. If it is technically not possible to identify you, then the risk of legal problems is not there. If

[–] dwt@feddit.org 2 points 1 day ago

If snowflake just forwards traffic to TOR then you are safe, because to get to you means successfully attacking TOR, which is extremely unlikely.

[–] hikaru755@lemmy.world 4 points 1 day ago

That's a bit outdated by now, Störerhaftung doesn't apply anymore for other people's action on your WiFi

[–] GreenShimada@lemmy.world -4 points 1 day ago (3 children)

I am worried that by allowing random users to surf using my network to prevent surveillance, someone will use my address to do malicious things, and I will get into legal consequences.

Yeah. That's not a hidden risk, that's an up-front risk you accept by using the extension. You may want to not let it keep running while the browser is closed, which would reduce how long the connection lets others use your IP.

All extensions make a fingerprint more identifiable. This is usually only used with Tor if a Tor connection is blocked, so if you're just using this on Chrome or stock FF, yes, it will be very unique.

You're having valid thoughts - but what are you trying to do? Why not just use a VPN?

[–] Scipitie@lemmy.dbzer0.com 11 points 1 day ago

This would only be correct if this would be an exit node, which it isn't.

This extension is not about personal gain but supporting people who can't enter the your network due to their local legislation.

Your fingerprinting argument only works for exit nodes - there you're be absolutely right though!

[–] voxel@feddit.uk 4 points 1 day ago

Not all browser extensions are fingerprintable, only those that do by the website measureable differences to your browsing, which Snowflake, as far as I'm aware does not.

[–] Crumpled6273@lemmy.ca 3 points 1 day ago

My ISP just aggressively blocking VPN and running tor network 24*7 system-wide doesn't make sense at all. To prevent network throttling I have to disable my VPN sometimes, and I only enable it when really needed which rarely bcz tor browser exist.

[–] cubism_pitta@lemmy.world -3 points 1 day ago* (last edited 1 day ago) (1 children)

Deleted as my comment was useless.

[–] Crumpled6273@lemmy.ca 3 points 1 day ago

What you commented? And why it's useless?

[–] ThatGuyNamedZeus@feddit.org -3 points 1 day ago (2 children)

never do it without a VPN, a good one that has a long, proven track record of recording nothing

[–] pcouy@lemmy.pierre-couy.fr 8 points 1 day ago (2 children)

How/why would a VPN be useful for this ?

[–] comrade_twisty@feddit.org 9 points 1 day ago

It’s the opposite of useful it would break snowflake. You are setting up Snowflake in the first place to give users who have to deal with VPN and IP blocks the opportunity to connect to the onion network through you - if you hide the snowflake relay behind a VPN it is useless to those users.

[–] ThatGuyNamedZeus@feddit.org -4 points 1 day ago (1 children)

it would prevent your internet provider from seeing the activity of other people connecting through your PC

[–] pcouy@lemmy.pierre-couy.fr 1 points 16 hours ago (1 children)

The ISP would only see "encrypted video call"-like traffic between you and the people who connect to Tor through your snowflake.

[–] ThatGuyNamedZeus@feddit.org 1 points 2 hours ago

But if you use a VPN regularly, like always, suddenly seeing a different type of traffic would look weird

[–] M1k3y@discuss.tchncs.de -2 points 1 day ago (1 children)

What would a vpn do for you with snowflake? Hide your IP from tor entry nodes and the bridge user. I mean sure more vpn is always great, but running snowflake without a vpn seems less bad than surfing the web without a vpn.

There are no legal risks in forwarding traffic to an entry node and your ISP knowing that you use snowflake also isnt really an issue.