this post was submitted on 01 Jun 2025
99 points (98.1% liked)

Linux

54796 readers
510 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
all 12 comments
sorted by: hot top controversial new old
[–] LainTrain@lemmy.dbzer0.com 17 points 5 days ago (1 children)

So it's basically to stop various glowware from calling home by detecting socks and bypassing it to use another network interface. Neat.

[–] TheTwelveYearOld@lemmy.world 4 points 4 days ago (3 children)
[–] tomalley8342@lemmy.world 13 points 4 days ago

When you describe something as "glowing", you are implying some sort of government or law enforcement interference. It was coined on 4chan's /g/ board and spread by /pol/ (as they often do) while they were in their infatuation phase with TempleOS creator Terry Davis, who was quoted as saying "The CIA n*****s glow in the dark, you can see them if you're driving. You just run them over, that's what you do".

[–] billwashere@lemmy.world 1 points 4 days ago

I’ve heard of ghostsocks but not glowware.

[–] fruitycoder@sh.itjust.works 1 points 3 days ago

I wonder how hard this would be to run as sidecar container in k8s. Like is there a way to capture every process in a system cleanly with it?

[–] pastermil@sh.itjust.works 4 points 4 days ago (2 children)

Honest question: hasn't the Tor network been proven to have been broken by the feds in that the anonimity of their users were no longer guaranteed?

[–] theblips@lemm.ee 1 points 1 day ago

It hasn't, it's just that good opsec is impossible in the long run and everyone is bound to be deanonymized eventually. For example, if you're using a clean account on a CP sharing forum, it's possible to track your mannerisms and post history (content, timezone, etc) to get an estimate of where you live. Then they can subpoena the ISPs for IP traffic in that region and figure out who is using Tor. That subset of IPs may then be cross referenced with the time that suspect's account posted, that can be used as probable cause for a warrant... That sort of stuff. Sounds super complicated but most of it can be automated and bypassed these days (I don't think you actually need to subpoena for example).
Where did the suspect fail? He should have used multiple accounts, spaced out the interactions more randomly, used stolen WiFi, ran his comments through a translator and back, etc. At no point did Tor fail at securing his IP address end to end

[–] foremanguy92_@lemmy.ml 6 points 4 days ago* (last edited 1 day ago) (1 children)

~~I think that the Tor network is proven to be broken by feds if you are suspicious.~~

The Tor network was in fact used to reveal the identity of someone (https://www.techradar.com/pro/security/german-authorities-apparently-cracked-tor-anonymity-but-onion-heads-say-its-still-safe) but as we don't know the truth we cannot really make conclusion but we can act that :

(Tor is always more secure if you're opsec is great from the beginning)

For example you're one of the biggest drug dealer and you're doing 100 000 of deaths every say, for sure they will cramp up to you and find you, succeeding to deanonymize you.

But most of the time you are not that attractive so you will be mostly anonymous. They can target an entity to reveal it but cannot deanonynize the entire network

[–] theblips@lemm.ee 1 points 1 day ago (1 children)

Source on the first statement?

[–] foremanguy92_@lemmy.ml 1 points 1 day ago

Gonna modify it a bit as sure it's not that true

[–] robotrono@lemmy.sdf.org 1 points 4 days ago

This looks interesting and appears to be somewhat similar to vopono which allows any app to be run in a separate namespace via a VPN provider.