Skip Navigation

Posts
14
Comments
37
Joined
1 yr. ago

  • This is all very nuanced and there isn't a clear cut answer. It really depends on what you're running, for how long you're running it, your device specs, etc. The LLMs I mentioned in the post did just fine and did not cause any overheating if not used for extended periods of time. You absolutely can run a SMALL LLM and not fry your processor if you don't overdo it. Even then, I find it extremely unlikely that you're going to cause permanent damage to your hardware components.

    Of course that is something to be mindful of, but that's not what the person in the original comment said. It does run, but you need to be aware of the limitations and potential consequences. That goes without saying, though.

    Just don't overdo it. Or do, but the worst thing that will happen is your phone getting hella hot and shutting down.

  • For me the biggest benefits are:

    • Your queries don't ever leave your computer
    • You don't have to trust a third party with your data
    • You know exactly what you're running
    • You can tweak most models to your liking
    • You can upload sensitive information to it and not worry about it
    • It works entirely offline
    • You can run several models
  • No. That has to do with how the Tor network works. The bridge forwards the connection to a non exit relay. You do not communicate with an exit relay whatsoever. The middle relay does, but the exit relay doesn't know who are are and you don't know who the exist relay is.

  • I am not entirely sure, to be completely honest. In my experience, it is very little but it varies too. It really depends on how many people connect, for how long they connect, etc. If you have limited upload speeds, maybe it wouldn't be a great idea to run it in your browser/phone. Maybe try running it directly on your computer using the -capacity flag?

    I haven't been able to find any specific numbers either, but I did find a post on the Tor Forum dated April 2023 or a user complaining about high bandwidth usage. This is not the norm in my experience, though.

  • I don't know that one. Is it FOSS?

  • I have not used AI to write the post. I used Claude to refine it because English is not my first language. If there are any errors, that is my bad. Please point them out as you did so I can fix them.

    This has several errors including the fact that running the proxy exposes your IP address.

    Thank you for pointing that out. That was worded pretty badly. I corrected it in the post.

    For further clarification:

    The person who is connecting to your Snowflake bridge is connecting to it in a p2p like connection. So, the person does know what your IP address is, and your ISP also knows that the person's IP address is – the one that is connecting to your bridge.

    However, to both of your ISPs, it will look like both of you are using some kind of video conferencing software, such as Zoom due to Snowflake using WebRTC technology, making your traffic inconspicuous and obfuscating to both of your ISPs what's actually going on.

    To most people, that is not something of concern. But, ultimately, that comes down to your threat model. Historically, there haven't any cases of people running bridges or entry and middle relays and getting in trouble with law enforcement.

    So, will you get in any trouble for running a Snowflake bridge? The answer is quite probably no.

    For clarification, you're not acting as an exit node if you're running a snowflake proxy. Please, check Tor's documentation and Snowflake's documentation.

  • Thank you for pointing that out. That was worded pretty badly. I corrected it in the post.

    For further clarification:

    The person who is connecting to your Snowflake bridge is connecting to it in a p2p like connection. So, the person does know what your IP address is, and your ISP also knows that the person's IP address is – the one that is connecting to your bridge.

    However, to both of your ISPs, it will look like both of you are using some kind of video conferencing software, such as Zoom due to Snowflake using WebRTC technology, making your traffic inconspicuous and obfuscating to both of your ISPs what's actually going on.

    To most people, that is not something of concern. But, ultimately, that comes down to your threat model. Historically, there haven't any cases of people running bridges or entry and middle relays and getting in trouble with law enforcement.

    So, will you get in any trouble for running a Snowflake bridge? The answer is quite probably no.

    For clarification, you're not acting as an exit node if you're running a snowflake proxy. Please, check Tor's documentation and Snowflake's documentation.

  • Not true. If you load a model that is below your phone's hardware capabilities it simply won't open. Stop spreading fud.

  • Privacy @lemmy.dbzer0.com

    How to run LLaMA (and other LLMs) on Android.

  • Privacy @lemmy.world

    How to run LLaMA (and other LLMs) on Android.

  • Privacy @lemmy.ml

    How to run LLaMA (and other LLMs) on Android.

  • Open Source @lemmy.ml

    How to run LLaMA (and other LLMs) on Android.

  • privacy @lemmy.ca

    Help people trying to circumvent censorship by running a Snowflake proxy!

  • Privacy @lemmy.world

    Help people trying to circumvent censorship by running a Snowflake proxy!

  • Privacy @lemmy.dbzer0.com
    Featured

    Help people trying to circumvent censorship by running a Snowflake proxy!

  • Of course! I run several snowflake proxies across my devices and their browsers.

  • I didn't use an LLM to make the post. I did, however, use Claude to make it clearer since English is not my first language. I hope that answers your question.

  • Tor - The Onion Router @lemmy.ml

    Help people trying to circumvent censorship by running a Snowflake proxy!

  • Privacy Guides @lemmy.one

    Help people trying to circumvent censorship by running a Snowflake proxy!

  • Privacy @lemmy.ml

    Help people trying to circumvent censorship by running a Snowflake proxy!

  • Pretty much. It's pretty straight forward.

  • That really depends on your threat model. The app isn't monitoring your activity or has imbedded trackers. It pulls content directly from YouTube's CDN. All they (Google) know is your IP address, but nothing else. For 99.9% of people that's totally ok.

  • Hmmm... You're right. It does feel a lot more arbitrary when you put it that way.

  • You know what? You actually do have a point.

  • My favorite anime website is down; good thing FMHY has a bunch of great ones to choose from. Migrating sucks, though.

  • There isn't really a natural barrier between North and South America, though. Asia has the Urals.

  • There's a flatpak too, but it's not good.

  • Really? It's been working just fine for me.

  • Ask Lemmy @lemmy.world

    How do you feel about your content getting scraped by AI models?

  • /0 @lemmy.dbzer0.com

    AI Data Scrapers: How do you feel about them?

  • No Stupid Questions @lemmy.world

    Is Threads fully integrated with the Fediverse?

  • Ask Lemmy @lemmy.world

    Are there any mental health communities here on Lemmy?