HOME

TheInfoList



OR:

Snowflake is a software package for assisting others in circumventing internet censorship by relaying data requests. Snowflake proxy nodes are meant to be created by people in countries where
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
and Snowflake are not blocked. People under censorship then use a Snowflake client (packaged with the
Tor Browser Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traffic ...
an
Onion Browser
to access the Tor network, using Snowflake relays as proxy servers. Access to the Tor network can in turn give access to other blocked services (like blocked websites). A Snowflake proxy can be created by either installing a browser extension, installing a stand-alone program or browsing a webpage with an embedded Snowflake proxy. The proxy runs after the user has voluntarily enabled it and the browser or program is connected to the
internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. In contrast to regular
VPNs Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not con ...
and proxy services, launching a Snowflake proxy does not require
port forwarding In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a netwo ...
or having a dedicated IP address. Simply installing the browser extension is enough most of the time. The simplicity of launching a proxy warrants their numerosity, which makes it hard for the censors to block proxies by simply blocking their
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es.Alt URL
/ref> As of 2024, Snowflake proxies are hosted on about 140 000 IP unique addresses concurrently. The average number of users that use Snowflake to connect to Tor is 35 000 and 29 TB of their traffic is relayed by Snowflake proxies daily.


History

Snowflake was originated by Serene, a hacker and former Google engineer and concert pianist. It was inspired by Flash proxy, a similar censorship circumvention system. The name "Snowflake" was coined as her metaphor for a large number of ephemeral proxies in relation to "
ICE Ice is water that is frozen into a solid state, typically forming at or below temperatures of 0 ° C, 32 ° F, or 273.15 K. It occurs naturally on Earth, on other planets, in Oort cloud objects, and as interstellar ice. As a naturally oc ...
Negotiation". Three programmers published the first version in January 2016. In 2019, it became available as a
browser extension A browser extension is a software module for customizing a web browser. Browsers typically allow users to install a variety of extensions, including user interface modifications, cookie management, ad blocking, and the custom scripting and st ...
for
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curr ...
and Chrome. It can also be run on derived browsers, such as Brave and
Microsoft Edge Microsoft Edge is a Proprietary Software, proprietary cross-platform software, cross-platform web browser created by Microsoft and based on the Chromium (web browser), Chromium open-source project, superseding Edge Legacy. In Windows 11, Edge ...
. In February 2023 a thoroughly upgraded, stand-alone version dubbed ''Snowstorm'' was released; written in
Rust Rust is an iron oxide, a usually reddish-brown oxide formed by the reaction of iron and oxygen in the catalytic presence of water or air moisture. Rust consists of hydrous iron(III) oxides (Fe2O3·nH2O) and iron(III) oxide-hydroxide (FeO(OH) ...
and funded by the
Open Tech Fund The Open Technology Fund (OTF) is an American nonprofit corporation that aims to support global Internet freedom technologies. Its mission is to "support open technologies and communities that increase free expression, circumvent censorship, an ...
, beta testing is by invitation.


Function

Normal internet data packages come labelled with the original source and the final recipient of the data. For example, a package containing the encrypted text of this article would be labelled with the destination (the
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
of the reader's computer), and the source (the IP address of a Wikipedia server). This means that even if the actual content is encrypted, a censor can block all packages from certain sources (for instance, banning any package that comes from Wikipedia).
Tor network Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traffic ...
can be used to access such blocked sites by acting as a proxy, covering the real destination address of the user's request. This is why censors usually try to block the Tor network as well. It is fairly easy for censors to block direct access to Tor because all regular Tor relays are public. Snowflake provides covert, indirect access to Tor. A Snowflake client is provided with the IP address of a currently-active Snowflake proxy by asking a broker server, which in turn uses
domain fronting Domain fronting is a technique for Internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than that which is discernable to ...
to pretend to be a major website. The client then talks directly to the Snowflake proxy, which relays into the Tor network. The traffic looks like ordinary
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of Node ...
traffic, such as that used by many videoconferencing apps. A Snowflake proxy runs whenever the browser or program is connected to the internet. If the proxy host has a
dynamic IP An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface ide ...
, the proxy will change its IP address over time. See also
ad hoc network An ad hoc network refers to technologies that allow network communications on an ad hoc basis. Associated technologies include: *Wireless ad hoc network *Mobile ad hoc network *Vehicular ad hoc network A Vehicular ad hoc network (VANET) is a prop ...
. Snowflake proxies are thus used as Tor entry nodes, not as exit nodes. Exit nodes are the other end of the chain. They are the Tor nodes that know what content was requested, though they do not know who requested it (for instance, they would know that ''someone'' was contacting a Wikipedia server, but they would not know the IP address of the user). Exit nodes might face legal action in the country in which they are hosted if they relay content that is illegal in that country (so they are usually run in countries with little internet censorship). It is unlikely that Snowflake proxy hosts could face such liability, since they do not know what content they are relaying. There are, however, countries where using Tor for any purpose is illegal, such as Russia and Iran.


Technical

Snowflake uses
WebRTC WebRTC (Web Real-Time Communication) is a free and open-source project providing web browsers and mobile applications with real-time communication (RTC) via application programming interfaces (APIs). It allows audio and video communication and ...
to allow browsers to communicate directly with one another. Either installing a browser extension, or keeping a tab open to a webpage with the right embedded code, causes one's browser to act as a proxy. Embedding a Snowflake badge in a website allows visitors to make their browser into a proxy, exactly as installing the extension does, but by clicking a button on the website rather than by installing software. Snowflake can also be run as a stand-alone program in a Docker container. Proxying traffic increases the proxy host's
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
usage, which may be a problem for those with bandwidth limits on their internet plans. In practice, hosting a Snowflake proxy does not seem to appreciably slow one's internet connection or disrupt browsing. A detailed technical description is published on
GitLab GitLab is a software forge primarily developed by GitLab Inc. It is available as a community edition and a commercial edition. History GitLab was created in 2011 by Ukrainian programmer Dmitriy Zaporozhets as a side project written in Rub ...
.


Countermeasures

Countermeasures believed to be currently in use against Snowflake from Russia include
browser fingerprinting A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprint ...
Snowflake hosts and then blocking them. Censors may also install and use Tor, then block all the IP addresses offered as Snowflake servers. Both of these techniques are weakened when there are larger numbers of servers. Censors may attempt to block the broker's IP address. To circumvent this, the Snowflake client utilizes
domain fronting Domain fronting is a technique for Internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than that which is discernable to ...
. This makes it infeasible for the censor to block a single website without blocking all the other websites hosted on the same cloud service.
Google Cloud Platform Google Cloud Platform (GCP) is a suite of cloud computing services offered by Google that provides a series of modular cloud services including computing, Computer data storage, data storage, Data analysis, data analytics, and machine learnin ...
and Amazon's AWS are examples of such services. They host hundreds of thousands of websites. Blocking all the servers of one of these major hosts has disruptive side effects. However, the cloud provider can and often does block domain fronting. If overseas connections from data centers are allowed, but residential and mobile services are restricted to local connections, then Tor bridges may be secretly and illegally set up in local data centers. This has obvious dangers. When a country shuts down access to foreign internet connections altogether, essentially cutting the country off from the global internet, Snowflake becomes useless. This has been repeatedly done in Iran and some other countries; it is, however, bad for business (in Iran in 2022, the cost was estimated at $37 million US a day), so it is usually only done for short periods.


Comparison to VPNs

A simple proxy, like a virtual private network (VPN), has only a single relay. This means that the server address of the VPN has to be known to every user, making them easier to block. For instance, at the beginning of October 2022, during Internet disruptions related to the
Mahsa Amini protests Civil unrest and protests against the Government of Iran, government of the Islamic Republic of Iran associated with the Death in custody, death in police custody of Death of Mahsa Amini#Victim, Mahsa Amini () began on 16 September 2022 and ca ...
, VPNs in Iran would drop connections every few minutes. The VPN itself also knows which end-users requested which pages, allowing VPNs to engage in surveillance. In some countries, such as
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, VPNs are illegal.


Uses

Snowflake came to be widely discussed online in the first week of October 2022, as a way of combating internet restrictions in Iran during the
Mahsa Amini protests Civil unrest and protests against the Government of Iran, government of the Islamic Republic of Iran associated with the Death in custody, death in police custody of Death of Mahsa Amini#Victim, Mahsa Amini () began on 16 September 2022 and ca ...
, and a guide in
Persian Persian may refer to: * People and things from Iran, historically called ''Persia'' in the English language ** Persians, the majority ethnic group in Iran, not to be conflated with the Iranic peoples ** Persian language, an Iranian language of the ...
was released. In 2022, the
Russian government The Russian Government () or fully titled the Government of the Russian Federation () is the highest federal executive governmental body of the Russian Federation. It is accountable to the president of the Russian Federation and controlled by ...
increased efforts to block access to Tor through technical and political means, and the Tor network reported an increase in traffic from Russia using Snowflake. Snowflake is integrated into the Tor network. Usage of the Tor network is becoming more common in
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
,
Belarus Belarus, officially the Republic of Belarus, is a landlocked country in Eastern Europe. It is bordered by Russia to the east and northeast, Ukraine to the south, Poland to the west, and Lithuania and Latvia to the northwest. Belarus spans an a ...
, and
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, , as
internet censorship Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as ''Wikipedia.org'', for example) but exceptionally may ...
in these countries has become more strict.


See also

* Psiphon uses a variety of anticensorship techniques * Smartphone ad hoc network, a peer-to-peer system that can be used when the conventional Internet infrastructure is entirely shut down ** Briar (software) uses Tor *
Sneakernet Sneakernet, also called sneaker net, is an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rathe ...
, a technique widely used in countries with little internet access. *
Toosheh Toosheh ( in Persian)Murphy, David. “Toosheh Uses Satellite TV to Sneak Content Past Iranian Censorship.” ''PCMAG'', 24 Apr. 2016, www.pcmag.com/news/343972/toosheh-uses-satellite-tv-to-sneak-content-past-iranian-cens. Retrieved 1 March 2018. i ...
uses satellite television receiving equipment to download (but not upload) files, which are then sometimes sneakernetted. * Flash proxy is a similar project, which Snowflake was inspired by.


References


External links


Live graph of user numbers
filterable by country of origin and transports (of which Snowflake is one) {{Authority control Tor (anonymity network) 2016 software