this post was submitted on 17 May 2025
3 points (100.0% liked)

privacy

383 readers
1 users here now

Rules (WIP)

  1. No ad hominem allowed
  2. Attack the idea, not the poster

founded 2 years ago
MODERATORS
 

You may have also heard of a tool with a similar goal, known as torsocks, which works by overwriting all network-related libc functions in a way to route traffic over a SOCKS proxy offered by Tor. While this approach is a bit more cross-platform, it has the notable downside that applications making system calls not through a dynamically linked libc, either with malicious intent or not, will leak data.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here