I wonder how hard this would be to run as sidecar container in k8s. Like is there a way to capture every process in a system cleanly with it?
So it’s basically to stop various glowware from calling home by detecting socks and bypassing it to use another network interface. Neat.
What’s glowware?
When you describe something as “glowing”, you are implying some sort of government or law enforcement interference. It was coined on 4chan’s /g/ board and spread by /pol/ (as they often do) while they were in their infatuation phase with TempleOS creator Terry Davis, who was quoted as saying “The CIA n*****s glow in the dark, you can see them if you’re driving. You just run them over, that’s what you do”.
I’ve heard of ghostsocks but not glowware.
Removed by mod
Honest question: hasn’t the Tor network been proven to have been broken by the feds in that the anonimity of their users were no longer guaranteed?
I think that the Tor network is proven to be broken by feds if you are suspicious.
For example you’re one of the biggest drug dealer and you’re doing 100 000 of deaths every say, for sure they will cramp up to you and find you, succeeding to deanonymize you.
But most of the time you are not that attractive so you will be mostly anonymous. They can target an entity to reveal it but cannot deanonynize the entire network
This looks interesting and appears to be somewhat similar to vopono which allows any app to be run in a separate namespace via a VPN provider.