this post was submitted on 15 May 2025
120 points (100.0% liked)

Linux

7343 readers
143 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of [email protected] and The GIMP

founded 2 years ago
MODERATORS
top 7 comments
sorted by: hot top controversial new old
[–] [email protected] 19 points 2 days ago
[–] [email protected] 6 points 1 day ago* (last edited 1 day ago) (1 children)

Other than the example uses provided in the article, does anyone have any interesting ideas for how this could be used? The RUST_LOG=debug one looks like it'll be particularly useful as an easy way to see what network requests a given binary might be making.

[–] [email protected] 5 points 1 day ago (1 children)

Would be cool if this could work on Android and essentially be able to pick and choose which apps to run over Tor.

[–] TwilightOracle 4 points 17 hours ago (1 children)
[–] [email protected] 2 points 8 hours ago

Sort of. Orbot is fine but for it to work it does have to modify the system's networking. It installs itself as a VPN so if I try to use it it'll kick me off the VPN my Android was already using. So yes Orbot can sort of let me pick apps to run over Tor but to do so it forces me off-VPN for all my other apps. Maybe that's an Android limitation or an Orbot quirk, not really sure.

The nice thing about this new Oniux is that it works more like a container for applications rather than have to modify the system's network.

[–] [email protected] 9 points 1 day ago

What happens to software that listens on an external port (0.0.0.0:12345)? Does a hidden service automatically get created for it? Or is this strictly a client tool?

[–] [email protected] 0 points 1 day ago

so, like torify up until now? tried it on a couple of apps as a replacement, works fine. the rust build chain though, madonn'...