If you use Firefox or Chrome, we developed an easy way you can help people bypass censorship.

Our Snowflake extension turns your browser into a proxy that connects Tor users in censored regions to the Tor network. snowflake.torproject.org/


@torproject how safe is this? sounds like a bakt for law enforcement

@kat @torproject from the description it seems like an entry point, not an exit point, so probably no business for policemen.

@kat @torproject

"There is no need to worry about which websites people are accessing through your proxy. Their visible browsing IP address will match their Tor exit node, not yours."

From the website.

How about actually *reading* the page linked to? Your snowflake acts as a little proxy hop to enter the Tor network, not as an exit node. Of course you should not run it in an environment where the Internet is censored.

@erAck @torproject my internet isn't censored but i know abt russian mathematician getting arrested on cp distribution charges bc he ran an exit node. i didn't read it in full but i am concerned

@erAck @torproject i'm not well versed in security or how tor works. i just wanna be safe and not draw in unneeded attention.

@kat It is possible a local observer can determine you're running Snowflake. Other commenters are correct that this is just an entry into the Tor network, so a local observer capturing all traffic will only see encrypted Tor traffic (which would NOT include "what website are they visiting" for example).

@kat @torproject That should be pretty safe, as your browser won't be an exit node, but just an entry node or even a proxy to reach Tor at all. So your own IP won't show up in any web server logs.

Sign in to participate in the conversation

Just a general instance with a catchy name.