• fruitycoder@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    2 days ago

    I wonder how hard this would be to run as sidecar container in k8s. Like is there a way to capture every process in a system cleanly with it?

  • LainTrain@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    19
    arrow-down
    2
    ·
    4 days ago

    So it’s basically to stop various glowware from calling home by detecting socks and bypassing it to use another network interface. Neat.

      • tomalley8342@lemmy.world
        link
        fedilink
        arrow-up
        13
        ·
        4 days ago

        When you describe something as “glowing”, you are implying some sort of government or law enforcement interference. It was coined on 4chan’s /g/ board and spread by /pol/ (as they often do) while they were in their infatuation phase with TempleOS creator Terry Davis, who was quoted as saying “The CIA n*****s glow in the dark, you can see them if you’re driving. You just run them over, that’s what you do”.

  • pastermil@sh.itjust.works
    link
    fedilink
    arrow-up
    4
    ·
    3 days ago

    Honest question: hasn’t the Tor network been proven to have been broken by the feds in that the anonimity of their users were no longer guaranteed?

    • theblips@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      19 hours ago

      It hasn’t, it’s just that good opsec is impossible in the long run and everyone is bound to be deanonymized eventually. For example, if you’re using a clean account on a CP sharing forum, it’s possible to track your mannerisms and post history (content, timezone, etc) to get an estimate of where you live. Then they can subpoena the ISPs for IP traffic in that region and figure out who is using Tor. That subset of IPs may then be cross referenced with the time that suspect’s account posted, that can be used as probable cause for a warrant… That sort of stuff. Sounds super complicated but most of it can be automated and bypassed these days (I don’t think you actually need to subpoena for example).
      Where did the suspect fail? He should have used multiple accounts, spaced out the interactions more randomly, used stolen WiFi, ran his comments through a translator and back, etc. At no point did Tor fail at securing his IP address end to end

    • foremanguy@lemmy.ml
      link
      fedilink
      arrow-up
      7
      arrow-down
      1
      ·
      edit-2
      7 hours ago

      I think that the Tor network is proven to be broken by feds if you are suspicious.

      The Tor network was in fact used to reveal the identity of someone (https://www.techradar.com/pro/security/german-authorities-apparently-cracked-tor-anonymity-but-onion-heads-say-its-still-safe) but as we don’t know the truth we cannot really make conclusion but we can act that :

      (Tor is always more secure if you’re opsec is great from the beginning)

      For example you’re one of the biggest drug dealer and you’re doing 100 000 of deaths every say, for sure they will cramp up to you and find you, succeeding to deanonymize you.

      But most of the time you are not that attractive so you will be mostly anonymous. They can target an entity to reveal it but cannot deanonynize the entire network

  • robotrono@lemmy.sdf.org
    link
    fedilink
    arrow-up
    1
    ·
    3 days ago

    This looks interesting and appears to be somewhat similar to vopono which allows any app to be run in a separate namespace via a VPN provider.