this post was submitted on 10 Mar 2026
69 points (96.0% liked)

Privacy

48315 readers
467 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

I have been using it for more than a week and now am worried about the consequences that I am not sure are true or not!

I am worried that by allowing random users to surf using my network to prevent surveillance, someone will use my address to do malicious things, and I will get into legal consequences. Also, what if many services blacklist my IP address so eventually I get a lot of restrictions in my browing experience.

Furthermore, will this extension increase my fingerprint?

Are these thoughts valid, or am I just overthinking? If anyone knows, please comment.

top 26 comments
sorted by: hot top controversial new old
[–] pineapple@lemmy.ml 46 points 1 month ago* (last edited 1 month ago) (1 children)

You cannot get into legal trouble for snowflake afaik. Its only a bridge, not an exit node. This means that websites the other person visits will see the exit nodes public ip, not yours.

Running a vpn for snowflake will only slow down the other persons connection without giving you much better security.

If it helps I've been running snowflake on my main browser for about a year now with no issues (not saying this is definitive proof for anything though.)

[–] FG_3479@lemmy.world 6 points 1 month ago (1 children)

Can the ISP see the websites the other person is visiting?

[–] M1k3y@discuss.tchncs.de 1 points 1 month ago

No, but they see that you are connected to a tor entry node and that someone is sending you data. From this they can conclude that you are running a tor proxy.

[–] pcouy@lemmy.pierre-couy.fr 26 points 1 month ago

This lets people use your computer as an entry point into the Tor network (if the regular, publicly known, entry nodes are blocked by their ISP or gouvernement). The snowflake extension will then forward people's traffic through the Tor network, and services they use will only see a tor exit node's IP, not yours. As long as you trust Tor to be secure and anonymous (I personally have very high trust in its guarantees), you don't have to worry about legal consequences or being blocked by services.

I used to run a few (public) tor relays (entry or middle nodes, not exit ones), including one from my home network and IP. Never had any issue except for one service which blocked everything that had anything to do with Tor. I reached out for their admin, who claimed Tor users can show up with any node's IP (which they definetly can't, only exit nodes will forward traffic to the regular internet)

[–] portnull@lemmy.dbzer0.com 22 points 1 month ago
[–] LurkingLuddite@piefed.social 6 points 1 month ago

Everyone is focused on the exit, when clearly there is still a vulnerability to the entrance side. If someone is identified as a bad actor, you do not want your own personal address showing up all over in the logs of who they've been conversing with... Regardless of what can be proven as to the nature of conversations, you will now have eyes on you.

So yes, a VPN is useful, just not for all the reasons the comments so far are addressing.

[–] dwt@feddit.org 1 points 1 month ago (2 children)

Definitely possible to get into legal consequences in Germany, because we have a law that makes you responsible for actions of strangers on your network. That’s why we front clubs /associations (not sure how to properly translate that) to take the legal risk for this.

For example freifunk e.v. http://freifunk.net/

Someone else will have to comment for the legal situation in the us though.

[–] M1k3y@discuss.tchncs.de 14 points 1 month ago (1 children)

Snowflake is different though, because you just forward encrypted traffic from users into tor. Your just a bridge from one network into another and don't send any malicious data data to random servers. Only the exit nodes have that legal issue.

[–] obinice@lemmy.world 0 points 1 month ago (2 children)

Functionally it may be different, but if I'm sat at a table with another user, next to a criminal gun salesman and their customer, the salesman passes me a gun, and I pass the gun to the other user, who then passes it to the customer, am I not just as guilty of facilitating that illegal exchange?

I understand that one could try to make that argument aimed at an ISP or internet infrastructure in general, but in this case the added element is that we are individuals, we know people are often using these services for illicit means, and we still choose to facilitate their use.

Honestly I don't know if I agree with my own argument 100%, but it's something someone could argue, and it's worth some thought before deciding to become a part of that shadowy community. Especially knowing there's a good chance at some point you're a willing link in the chain for criminal activity, even if it probably can't be traced back to you.

Hmm, food for thought I suppose.

[–] bright_side_@piefed.world 3 points 1 month ago

I think what you're writing is true, though that is the legal/moral part. If it is technically not possible to identify you, then the risk of legal problems is not there. If

[–] dwt@feddit.org 2 points 1 month ago

If snowflake just forwards traffic to TOR then you are safe, because to get to you means successfully attacking TOR, which is extremely unlikely.

[–] hikaru755@lemmy.world 3 points 1 month ago

That's a bit outdated by now, Störerhaftung doesn't apply anymore for other people's action on your WiFi

[–] cubism_pitta@lemmy.world -1 points 1 month ago (1 children)

I am too buzzed and lazy to google. I imagine this is at worst like running a Tor exit node.

You could be responsible for all traffic leaving your network as the traffic can be identified and traced to you.

With the Tor network running a node that is not an exit not is pretty safe though and does help that network

[–] Crumpled6273@lemmy.ca 1 points 1 month ago

What you commented? And why it's useless?

[–] GreenShimada@lemmy.world -3 points 1 month ago (3 children)

I am worried that by allowing random users to surf using my network to prevent surveillance, someone will use my address to do malicious things, and I will get into legal consequences.

Yeah. That's not a hidden risk, that's an up-front risk you accept by using the extension. You may want to not let it keep running while the browser is closed, which would reduce how long the connection lets others use your IP.

All extensions make a fingerprint more identifiable. This is usually only used with Tor if a Tor connection is blocked, so if you're just using this on Chrome or stock FF, yes, it will be very unique.

You're having valid thoughts - but what are you trying to do? Why not just use a VPN?

[–] Scipitie@lemmy.dbzer0.com 8 points 1 month ago

This would only be correct if this would be an exit node, which it isn't.

This extension is not about personal gain but supporting people who can't enter the your network due to their local legislation.

Your fingerprinting argument only works for exit nodes - there you're be absolutely right though!

[–] voxel@feddit.uk 3 points 1 month ago

Not all browser extensions are fingerprintable, only those that do by the website measureable differences to your browsing, which Snowflake, as far as I'm aware does not.

[–] Crumpled6273@lemmy.ca 2 points 1 month ago

My ISP just aggressively blocking VPN and running tor network 24*7 system-wide doesn't make sense at all. To prevent network throttling I have to disable my VPN sometimes, and I only enable it when really needed which rarely bcz tor browser exist.