119
submitted 3 days ago by Sunshine@lemmy.ca to c/linux@programming.dev
top 7 comments
sorted by: hot top controversial new old
[-] swelter_spark@reddthat.com 18 points 3 days ago
[-] Lemmchen@feddit.org 9 points 3 days ago

What happens to software that listens on an external port (0.0.0.0:12345)? Does a hidden service automatically get created for it? Or is this strictly a client tool?

[-] trevor 6 points 3 days ago* (last edited 3 days ago)

Other than the example uses provided in the article, does anyone have any interesting ideas for how this could be used? The RUST_LOG=debug one looks like it'll be particularly useful as an easy way to see what network requests a given binary might be making.

[-] brickfrog@lemmy.dbzer0.com 5 points 3 days ago

Would be cool if this could work on Android and essentially be able to pick and choose which apps to run over Tor.

[-] TwilightOracle@programming.dev 4 points 2 days ago
[-] brickfrog@lemmy.dbzer0.com 3 points 2 days ago

Sort of. Orbot is fine but for it to work it does have to modify the system's networking. It installs itself as a VPN so if I try to use it it'll kick me off the VPN my Android was already using. So yes Orbot can sort of let me pick apps to run over Tor but to do so it forces me off-VPN for all my other apps. Maybe that's an Android limitation or an Orbot quirk, not really sure.

The nice thing about this new Oniux is that it works more like a container for applications rather than have to modify the system's network.

[-] glitching@lemmy.ml 1 points 3 days ago

so, like torify up until now? tried it on a couple of apps as a replacement, works fine. the rust build chain though, madonn'...

this post was submitted on 15 May 2025
119 points (100.0% liked)

Linux

7349 readers
164 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS