I have been using it for more than a week and now am worried about the consequences that I am not sure are true or not!

I am worried that by allowing random users to surf using my network to prevent surveillance, someone will use my address to do malicious things, and I will get into legal consequences. Also, what if many services blacklist my IP address so eventually I get a lot of restrictions in my browing experience.

Furthermore, will this extension increase my fingerprint?

Are these thoughts valid, or am I just overthinking? If anyone knows, please comment.

  • pineapple@lemmy.ml
    link
    fedilink
    English
    arrow-up
    55
    ·
    1 month ago

    You cannot get into legal trouble for snowflake afaik. Its only a bridge, not an exit node. This means that websites the other person visits will see the exit nodes public ip, not yours.

    Running a vpn for snowflake will only slow down the other persons connection without giving you much better security.

    If it helps I’ve been running snowflake on my main browser for about a year now with no issues (not saying this is definitive proof for anything though.)

      • M1k3y@discuss.tchncs.de
        link
        fedilink
        arrow-up
        2
        ·
        1 month ago

        No, but they see that you are connected to a tor entry node and that someone is sending you data. From this they can conclude that you are running a tor proxy.

  • pcouy@lemmy.pierre-couy.fr
    link
    fedilink
    arrow-up
    32
    arrow-down
    1
    ·
    1 month ago

    This lets people use your computer as an entry point into the Tor network and camouflage the traffic as a video call between you and them (if the regular, publicly known, entry nodes are blocked by their ISP or gouvernement). The snowflake extension will then forward people’s traffic through the Tor network, and services they use will only see a tor exit node’s IP, not yours. As long as you trust Tor to be secure and anonymous (I personally have very high trust in its guarantees), you don’t have to worry about legal consequences or being blocked by services.

    I used to run a few (public) tor relays (entry or middle nodes, not exit ones), including one from my home network and IP. Never had any issue except for one service which blocked everything that had anything to do with Tor. I reached out for their admin, who claimed Tor users can show up with any node’s IP (which they definetly can’t, only exit nodes will forward traffic to the regular internet)

  • LurkingLuddite@piefed.social
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    1 month ago

    Everyone is focused on the exit, when clearly there is still a vulnerability to the entrance side. If someone is identified as a bad actor, you do not want your own personal address showing up all over in the logs of who they’ve been conversing with… Regardless of what can be proven as to the nature of conversations, you will now have eyes on you.

    So yes, a VPN is useful, just not for all the reasons the comments so far are addressing.

  • GreenShimada@lemmy.world
    link
    fedilink
    arrow-up
    5
    arrow-down
    7
    ·
    1 month ago

    I am worried that by allowing random users to surf using my network to prevent surveillance, someone will use my address to do malicious things, and I will get into legal consequences.

    Yeah. That’s not a hidden risk, that’s an up-front risk you accept by using the extension. You may want to not let it keep running while the browser is closed, which would reduce how long the connection lets others use your IP.

    All extensions make a fingerprint more identifiable. This is usually only used with Tor if a Tor connection is blocked, so if you’re just using this on Chrome or stock FF, yes, it will be very unique.

    You’re having valid thoughts - but what are you trying to do? Why not just use a VPN?

    • Crumpled6273@lemmy.caOP
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      My ISP just aggressively blocking VPN and running tor network 24*7 system-wide doesn’t make sense at all. To prevent network throttling I have to disable my VPN sometimes, and I only enable it when really needed which rarely bcz tor browser exist.

    • Voxel@feddit.uk
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      Not all browser extensions are fingerprintable, only those that do by the website measureable differences to your browsing, which Snowflake, as far as I’m aware does not.