I was reading this guide on how to run a snowflake proxy, and I’m considering doing it.

https://snowflake.torproject.org/

I’m currently renting a small VPS for my self-hosted services, and I have some spare capacity. So I was wondering, are there any downsides that I might be overlooking?

My self-hosted services are on a URL with my real name. Could there be any privacy or legal implications for me? (I don’t live under an authoritarian regime)

  • emhl@feddit.de
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 year ago

    Snowflakes are used as entry nodes, not as exit nodes. So if your Vps provider doesn’t forbid running tor services you should not face any downsides

      • pHr34kY@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        ·
        edit-2
        1 year ago

        I did… Until the police knocked on my door. They said I was lucky because they decided to ask questions first, but they technically could have siezed every computer in my house without warning. I don’t think you’d ever get convicted for something obviously done over tor, but having your stuff taken while they investigate is really inconvenient.

    • mim@lemmy.sdf.orgOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Thanks! I’ll check with my vps provider.

      However, this proxy does not seem to be “within” the tor network itself, right? I’m just connecting someone to the first entry node on the system, correct?

      Would I be transmitting unencrypted data? In other words, would an outsider be able to tell that I’m transmitting something illegal to a person accessing tor?

      • emhl@feddit.de
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        1 year ago
        • The entry node doesn’t know what data is being transmitted (or from where that data is) only who it’s being transmitted to.
        • The middle nodes know nothing about the data and just know the previous and next hop.
        • The exit node knows what data is being accessed (if it’s not being accessed via Https) but not who is accessing it

        So in other words: no, you’re not transmitting unencrypted data

      • TheLemming@feddit.de
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        would an outsider be able to tell that I’m transmitting something illegal to a person accessing tor?

        No, because if that was possible, law enforcement would set up quite some of those and catch some bad guys

    • mim@lemmy.sdf.orgOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      Thanks! Would you be able to elaborate a bit more?

      It was my understanding that this is not the same thing as running an exit node.

      • ErwinLottemann@feddit.de
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        11
        ·
        1 year ago

        I skimmed over the page you linked and it sounds like an ‘exit node’, or more precisely, just a proxy. So all the traffic looks like it’s coming from you.

        • Brickfrog@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          17
          ·
          1 year ago

          From OP’s link under the “operate a Snowflake proxy” section

          You can join thousands of volunteers from around the world who have a Snowflake proxy installed and running. There is no need to worry about which websites people are accessing through your Snowflake proxy. Their visible browsing IP address will match their Tor exit node, not yours.

          A Snowflake proxy is not a Tor exit node.