1
47
submitted 7 months ago* (last edited 7 months ago) by llama@lemmy.dbzer0.com to c/privacy@lemmy.dbzer0.com

cross-posted from: https://lemmy.dbzer0.com/post/36880616

Help Combat Internet Censorship by Running a Snowflake Proxy (Browser or Android)

Internet censorship remains a critical threat to free expression and access to information worldwide. In regions like Iran, Russia, and Belarus, journalists, activists, and ordinary citizens face severe restrictions when trying to communicate or access uncensored news. You can support their efforts by operating a Snowflake proxy—a simple, low-impact way to contribute to a freer internet. No technical expertise is required. Here’s how it works:


What Is Snowflake?

Snowflake is a privacy tool integrated with the Tor network. By running a Snowflake proxy, you temporarily route internet traffic for users in censored regions, allowing them to bypass government or institutional blocks. Unlike traditional Tor relays, Snowflake requires minimal bandwidth, no configuration, and no ongoing maintenance. Your device acts as a temporary bridge, not a permanent node, ensuring both safety and ease of use.


Is This Safe for Me?

Short answer: Yes.

Long answer: pobably. Here is why:

  • Your IP address is not exposed to the websites they access. So, you don't have to worry about what they are doing either. You are not an exit node.
  • No activity logs. Snowflake cannot monitor or record what users do through your connection. The only stored information is how many people have connected to your bridge. Check docs for further info on this.
  • Low resource usage. The data consumed is comparable to background app activity—far less than streaming video or music.
  • No direct access to your system
  • No storage of sensitive data. Snowflake proxies do not store any sensitive data, such as IP addresses or browsing history, on your system.
  • Encrypted communication. All communication between the Snowflake proxy and the Tor network is encrypted, making it difficult for attackers to intercept or manipulate data.

You are not hosting a VPN or a full Tor relay. Your role is limited to facilitating encrypted connections, similar to relaying a sealed envelope.

Your IP address is exposed to the user (in a P2P-like connection). Be mindful that your ISP could also potentially see the WebRTC traffic and the connections being made to it (but not the contents), so be mindful of your threat model.

For most users, it is generally safe to run Snowflake proxies. Theoretically, your ISP will be able to know that there are connections being made there, but to them it will look like you're calling someone on, say, Zoom.

Historically, as far as we know, there haven't been any cases of people getting in legal trouble for running entry relays, middle relays, or bridges. There have a been a few cases of people running exit nodes and getting in trouble with law enforcement agencies, but none of them have been arrested or prosecuted as far as I know it. If you are aware of any cases, let me know so I can update this post.

Do not hesitate to check Snowflake's official documentation for further reference and to make informed decisions.


How to Set Up a Snowflake Proxy

Option 1: Browser Extension (Brave, Firefox, or Chrome)

  1. Install the Snowflake extension.
  2. Click the Snowflake icon in your browser toolbar and toggle "Enable Snowflake."
  3. Keep the browser open. That’s all.

Note: Brave users can enable Snowflake directly in settings. Navigate to brave://settings/privacy and activate the option under "Privacy and security."


Option 2: Android Devices via Orbot

  1. Download Orbot (Tor’s official Android app).
  2. Open the app’s menu, select "Snowflake Proxy," and toggle it on.
  3. For continuous operation, keep your device charged and connected to Wi-Fi.

Your device will now contribute as a proxy whenever the app is active.


Addressing Common Concerns

  • Battery drain: Negligible. Snowflake consumes fewer resources than typical social media or messaging apps.
  • Data usage: Most users report under 1 GB per month. Adjust data limits in Orbot’s settings or restrict operation to Wi-Fi if necessary.

Why Your Participation Matters

Censorship mechanisms grow more sophisticated every year, but tools like Snowflake empower ordinary users to counteract them. Each proxy strengthens the Tor network’s resilience, making it harder for authoritarian regimes to isolate their populations. By donating a small amount of bandwidth, you provide someone with a critical connection to uncensored information, education, and global dialogue.

Recent surges in demand—particularly in Russia—highlight the urgent need for more proxies. Your contribution, however small, has an impact.

By participating, you become part of a global effort to defend digital rights and counter censorship. Please, also be mindful of your threat mode and understand the potential risks (though very little for most people). Check Snowflake's official documentation for further reference and don't make any decisions based on this post before taking your time to read through it.

Please share this post to raise awareness. The more proxies, the stronger the network.

– llama

2
37
submitted 7 months ago* (last edited 7 months ago) by shaytan@lemmy.dbzer0.com to c/privacy@lemmy.dbzer0.com

It's hard to make the full switch towards a more private life, but switching your mail already fixes a big underlying issue: that being, Google or other companies having access to all your emails. So, I'll cover the basics of making your online mailing more private.

Switching Mail Providers:

Your email is a big part of your online footprint and helps you keep track of your online identity. So, in order to keep that to yourself, I encourage leaving services like:

"Gmail" or "Outlook",

for others like:

"ProtonMail" or "Tutanota".

This is already a big step towards keeping all your emails private and safe. Both of these are free and respect your privacy on their free tier, but expand in features with paid plans. This takes time, as you have to switch your email on most accounts to this new email.

For the best privacy, you should delete most accounts and create new ones with this new email or with aliases. Some people, like myself, prefer to have multiple emails over aliases. For example:

  • "something.banking11231@provider.me" -> For banking and finance
  • "something.social12312@provider.me" -> For social media
  • "general.use@provider.me" -> For casual and responsible internet use
  • "something.trash21412@provider.me" -> For crappy websites or similar uses

(Self-hosting your own mail domain is possible, but it’s a harder process, and custom domains are not always accepted or reliable.)

(You should keep your old email for a year or so to make sure no important service was left behind locked to that email. Once that's done, you can delete the account.)

Tips:

If you can, you should try expanding your protocol with this:

  • Adding 2FA to any online website, especially email. I use ~~"Authy" ~~for this. -> Better use Aegis, good app!

  • Switching your browser to something like "Librewolf".

  • Switching to a password manager like "Proton Pass" or "1Password".

  • Encourage your close family to do the same once you're comfortable with the process.

  • Switch social media to private alternatives.

  • If you take any efforts to switch browser or install Aegis, try to use "F-droid", or even better, "Droidify". These being a FOSS app store, and a good Material alternative frontend. For apps not in here, consider "Aurora store", a more private **"Play store" **alternative

This is about it for me, quick posts from class, feel free to add into this topic bellow.

Edit:

Important additions after reading the comments:

  • Proton is a bit disencouraged by some for some political views published by the CEO under proton's account and image. They backed down, and I believe it isn't something too bad as for users to leave such a good privacy oriented suite of apps. I encourage anyone who cares about this topic to research before making the switch.

  • Mail is not 100% private with any option, and shouldn't be used for highly sensitive information. For that use end to end encrypted apps well respected, like "signal". Still is best to just don't send very sensitive information online.

  • As a comment pointed, for a mail to be as private as possible, both the sender and reciever should have a private mail, otherwise you can be private but the other person would still be having your mail conversations stored under "gmail" or similar.

Sorry if this post didn't give the best newbie advice, I tried to track back some of my old knowledge, but I'll take more time to research the next time. Take care and stay private!

3
48
4
66
  • they advertise themselves as degoogled, but instead let you connect to Google/Microsoft/etc services

  • replace all the proprietary not at all Secure Services from Google, with.... Drumroll please.... Proprietary and not at all Secure Services from themselves and actively encourage it.

  • They are For-profit

  • and being MORE out of date then even Fairphones stock roms.

But a TL;DR:

/E/ is not Private. They just switch one bad comany to another one.

5
47
6
37
7
12

cross-posted from: https://programming.dev/post/36575333

Main Page.

Property technology broadly refers to the use of software, digital platforms, and other digital tools used in the housing market. Property owners and renters use these technologies for functions including advertising, touring, leasing, and financial management of rental housing. These tools may incorporate computer algorithms and artificial intelligence.

Selected Property Technology Tools Used in Rental Housing

Property technology tools used for advertising, tenant screening, rent-setting, and facial recognition have both benefits and risks. For example, facial recognition technology can enhance safety, according to three industry associations and all 10 of the public housing agencies in GAO's review. However, these tools also may pose risks related to transparency, discriminatory outcomes, and privacy. For instance, potential renters may struggle to understand, and owners to explain, the basis for screening decisions made by algorithms. Facial recognition systems also might misidentify individuals from certain demographic groups, and property owners might use surveillance information without renter consent, according to advocacy groups GAO interviewed.

The four federal agencies took several actions to address these risks. To combat alleged misleading and discriminatory advertising on rental platforms, agencies pursued legal action and obtained settlements requiring changes to advertising practices and improved compliance with the Fair Housing Act. They also took enforcement actions against tenant screening companies for using inaccurate or outdated data.

However, all 10 public housing agencies stated public housing agencies would benefit from additional direction on use of facial recognition technology. The Department of Housing and Urban Development's (HUD) current guidance to these agencies is high-level and does not provide specific direction on key operational issues, such as managing privacy risks or sharing data with law enforcement. More detailed written direction could provide public housing agencies additional clarity on the use of facial recognition technology and better address tenant privacy concerns.

8
21
9
47
10
13
11
2

cross-posted from: https://programming.dev/post/36487769

Comments

12
4

Now that my go-to exchange Tradeogre has been fedded, I’m looking for alternatives to swap relatively good amounts from and to XMR.

I've heard bad stories about ChangeNOW, Changelly, and FixFloat. On Reddit are full of posts where people accuse them of being scams or having funds locked. (Same happened to a friend)

Hopefully someone here has some good suggestions.

13
19

cross-posted from: https://lemmy.dbzer0.com/post/51941292

Right now, my default is Cromite, and I occasionally use Brave as well. I have tried Firefox with uBO, but unfortunately it is slower than the aforementioned browsers and also lacks some features. I've also heard that Gecko-based browsers in general have a security issue on Android, but I don't know the details. Which browser(s) do you use/recommend and why?

14
68
15
10
16
51

With a privacy protecting setup, the mainstream internet is almost unusable. To sign up for social media or even a gmail account, one has to provide a phone number for verification. Youtube doesn’t work when not signed into a Google account, or if one is connected to a VPN. Even downloader programs like yt-dlp and freyr have been rendered useless by the strict access controls of the major platforms. There is a vast amount of community, DIY, and educational material of all sorts behind these platform walls, so how can someone who doesn’t want to be tracked access any of it these days?

There are alternatives like archive.org and peertube which are wonderful but have nowhere near the amount of content that people have been uploading to YouTube over the years. For example, if I need to fix a washing machine and there is a tutorial on YouTube, how can I see it while still preserving a modicum of privacy online?

17
19

Cybersecurity firm Koi Security revealed that FreeVPN.One, a Chrome VPN extension with over 100,000 users, has been secretly capturing and transmitting screenshots of users' browsing activity to remote servers[^1][^2].

The spyware functionality was introduced in July 2025 after earlier updates expanded the extension's permissions. According to researcher Lotan Sery from Koi Security, "FreeVPN.One shows how a privacy branding can be flipped into a trap"[^3].

When confronted, the developer claimed screenshots were only taken of suspicious sites and were encrypted, but researchers found evidence of capture on trusted sites like Google Photos[^5]. The extension's "AI Threat Detection" feature discloses taking screenshots, but Koi Security found most surveillance occurred silently in the background[^8].

The case highlights growing risks with free VPN services, particularly as demand increases due to new online safety regulations in the UK requiring age verification[^3].

[^1]: GIGAZINE - Chrome VPN Extension Accused of Secretly Capturing User Screenshots

[^2]: It's FOSS - Google Verified FreeVPN Caught Red-handed Spying on its Users

[^3]: VARINDIA - Chrome VPN Extension Accused of Secretly Capturing User Screenshots

[^5]: It's FOSS - Google Verified FreeVPN Caught Red-handed Spying on its Users

[^8]: Instagram - Dhaka Chronicles post about FreeVPN.One spying

18
20

Hey just wondering if anybody has any experience in a decentralized cloud storage solution. Pretty much just a personal replacement of Google, Apple, and Dropbox services. I’ve been doing some research and it seems like a cool technology that I have not heard about until I went looking for it. So just wanted to know if anyone had experience with it, the pricing, and which one they recommended. Thanks you.

19
45
20
33
Best Routers for Privacy? (lemmy.dbzer0.com)

I'm looking to get a new router, but all of the ones I've found try to force a mandatory internet connection/account creation to activate them without any bypass methods (at least that my searching could find).

Is there any way to get a new router to work without connecting an account to it? Or a way to bypass it? If not, is there a specific used router that might be more privacy friendly?

I don't need anything special, it's just home wifi.

21
13
22
30
23
48

cross-posted from: https://programming.dev/post/36109840

Photo by Sora Shimazaki

by Nikita Biryukov, New Jersey Monitor
August 19, 2025

Police did not act improperly when an officer gained access to the phone of an individual detained for kidnapping, sex assault, and other serious charges after watching the man enter his cellphone passcode and committing it to memory, a New Jersey appeals court ruled Tuesday.

Tyrone Ellison, who was arrested and convicted after kidnapping a minor with substance abuse issues from a Newark hospital, had no reasonable expectation of privacy when he unlocked his phone while in police custody and under the supervision of a detective, the court ruled.

“There was no violation of defendant’s Fifth Amendment right against self-incrimination where defendant voluntarily requested his cell phone, was not compelled to provide the passcode and voluntarily entered the passcode in the officer’s presence,” the judges wrote.

Police could not leave Ellison unattended with his phone without risking him deleting evidence, the ruling adds.

The judges said prior case law that found an arrestee maintained a reasonable expectation of privacy when making a call from a police station without being told that call may be monitored or recorded does not apply to Ellison’s case.

Ellison, the judges wrote, was aware of the detective’s presence when entering his passcode, did not attempt to conceal his password, and was not stopped from concealing his passcode from police.

“There was no deception or trickery used to obtain defendant’s passcode. Nor did the police orchestrate the situation to induce defendant to reveal the passcode,” the court wrote.

In effect, Ellison’s expectation of privacy vanished when he chose to unlock his phone in the presence of police, the court found.

A divided New Jersey Supreme Court in 2020 ruled in Andrews v. New Jersey that while the Fifth Amendment presumptively protects individuals’ passcodes, they can be compelled to reveal them under the foregone conclusion exception to the amendment. That exception allows the compelled disclosure of documents and passcodes as long as authorities know they exist and the individual subject to the warrant knows and possesses them.

Tuesday’s ruling says another doctrine that allows authorities to use improperly obtained information if it would have inevitably come into their possession through proper channels would have allowed police to use the passcode even if it was initially obtained improperly.

Police obtained a communications data warrant to search the phone and could have obtained an order to compel Ellison to disclose his passcode, the judges wrote.

“Once the passcode was compelled, law enforcement would have been able to access the contents of the phone,” the judges wrote.

The New Jersey Office of the Public Defender represented Ellison. Alison Perrone, deputy of the office’s appellate section, called the ruling concerning and said her office will ask the New Jersey Supreme Court to review the case.

“The ability of law enforcement to observe and later use a person’s private phone passcode while in custody presents serious questions about constitutional rights in the digital era,” Perrone said in a statement.

GET THE MORNING HEADLINES.SUBSCRIBE

New Jersey Monitor is part of States Newsroom, a nonprofit news network supported by grants and a coalition of donors as a 501c(3) public charity. New Jersey Monitor maintains editorial independence. Contact Editor Terrence T. McDonald for questions: info@newjerseymonitor.com.

Creative Commons license CC BY-NC-ND 4.0.

24
107
25
15

cross-posted from: https://lemmybefree.net/post/1243814

Hi! I'm looking for a privacy respecting Android tablet.

I ruled out the google tablet due to it being too expensive with an LCD screen

I would prefer a nice OLED screen if possible (or similar), and preferably cheap. Must be able to stream HEVC encoded videos (not 10 years old hardware), and preferably more (VP9, AV1, for future proofing)

The main use will be to watch content (movies, series, videos) from YouTube and Jellyfin, and sometimes some other apps if they're not enforcing the Play Integrity API

So far I've searched some OS and I'm considering LineageOS or /e/OS, with /e/OS looking better in terms of privacy. Don't want google to track everywhere I go and everything I do.

Any recommendations for good cheap hardware with bootloader unlocking, and recommendations for a good Android ROM?

view more: next ›

Privacy

3702 readers
57 users here now

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be civil and no prejudice
  2. Don't promote big-tech software
  3. No apathy and defeatism for privacy (i.e. "They already have my data, why bother?")
  4. No reposting of news that was already posted
  5. No crypto, blockchain, NFTs
  6. No Xitter links (if absolutely necessary, use xcancel)

Related communities:

Some of these are only vaguely related, but great communities.

founded 9 months ago
MODERATORS