I was reading this guide on how to run a snowflake proxy, and I’m considering doing it.
https://snowflake.torproject.org/
I’m currently renting a small VPS for my self-hosted services, and I have some spare capacity. So I was wondering, are there any downsides that I might be overlooking?
My self-hosted services are on a URL with my real name. Could there be any privacy or legal implications for me? (I don’t live under an authoritarian regime)
Snowflakes are used as entry nodes, not as exit nodes. So if your Vps provider doesn’t forbid running tor services you should not face any downsides
Who actually hosts exit nodes considering the risk of doing so?
I did… Until the police knocked on my door. They said I was lucky because they decided to ask questions first, but they technically could have siezed every computer in my house without warning. I don’t think you’d ever get convicted for something obviously done over tor, but having your stuff taken while they investigate is really inconvenient.
That probably depends on your vps provider (if using vps). Hosting exit node at home is clearly a bad idea.
Check this (mind that this not have to fresh enough): https://community.torproject.org/relay/community-resources/good-bad-isps/
Thanks! I’ll check with my vps provider.
However, this proxy does not seem to be “within” the tor network itself, right? I’m just connecting someone to the first entry node on the system, correct?
Would I be transmitting unencrypted data? In other words, would an outsider be able to tell that I’m transmitting something illegal to a person accessing tor?
So in other words: no, you’re not transmitting unencrypted data
No, because if that was possible, law enforcement would set up quite some of those and catch some bad guys