You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Many of our bridges are only distributed via private methods, such as bridge distribution methods operated by the Tor Project, or [private bridges](#private-bridges) we operate for NGOs and other groups, so that they are not easily blocked. However, if you would like to use Triplebit-operated bridges in place of your guard node and are not experiencing censorship yourself, we operate **4** public bridges in two locations for you to choose from.
15
+
Many of our bridges are only distributed via private methods, such as bridge distribution methods operated by the Tor Project, or [private bridges](#private-bridges) we operate for NGOs and other groups, so that they are not easily blocked. However, if you would like to use Triplebit-operated bridges in place of your guard node and are not experiencing censorship yourself, we operate **5** public bridges in two locations for you to choose from.
16
16
17
17
Please read the Tor Project's bridge [documentation](https://tb-manual.torproject.org/bridges/) for information on how to set up manual bridges in Tor Browser. These bridges, like all of our infrastructure, run on bare-metal servers owned by Triplebit.
Using a trustworthy bridge can be preferable to using a standard guard node, because it can typically offer better performance and it significantly lowers the risk of your entry point to the Tor network being compromised or malicious. On the other hand, it can make you stand out from other Tor clients (particularly to local network operators), because you will likely be the only Tor user locally using that bridge. This may be of particular note to you if you use Tor while traveling between different public networks, and don't want to be physically tracked between them. You should understand your needs and [threat model](https://www.privacyguides.org/en/basics/threat-modeling/) before changing any Tor settings.
43
43
44
+
### Private Snowflake (Beta)
45
+
46
+
Triplebit operates a private Snowflake broker, completely independently of Tor Project's Snowflake infrastructure. Our Snowflake proxies can only be used by adding our custom Snowflake bridge lines to your Tor Browser or `torrc` configuration. These are not yet published, but feel free to contact us if you would like to test this service out.
47
+
48
+
One benefit of our private broker is higher performance. We are only running dedicated proxies on high-speed networks, whereas the public Snowflake network is run by the public on all manner of devices and browser extensions. Of course, the flip side of this is that we lack the high IP diversity which makes the traditional Snowflake network difficult to block.
Triplebit currently operates **9** NAT-free, unfiltered Snowflake proxy servers across our points of presence. Snowflake servers do not have any public identifiers, so they are not enumerated on this page.
55
+
Triplebit currently operates **4** NAT-free, unfiltered Snowflake proxy servers across our points of presence, which are registered to the Tor Project's public broker. If you choose to use the built-in Snowflake bridge in Tor Browser your traffic may be routed through these proxies, but there is no way to select them manually. Snowflake servers do not have any public identifiers, so they are not enumerated on this page.
47
56
48
57
Snowflake is the easiest way to contribute to the Tor Project, and you can do so yourself from any web browser. Visit [**snowflake.torproject.org**](https://snowflake.torproject.org/) for more information about this technology.
0 commit comments