Introducing oniux: Kernel-level Tor isolation for any Linux app
Introducing oniux: Kernel-level Tor isolation for any Linux app

Introducing oniux: Kernel-level Tor isolation for any Linux app | Tor Project

Introducing oniux: Kernel-level Tor isolation for any Linux app
Introducing oniux: Kernel-level Tor isolation for any Linux app | Tor Project
Niiiice.
What happens to software that listens on an external port (0.0.0.0:12345)? Does a hidden service automatically get created for it? Or is this strictly a client tool?
Other than the example uses provided in the article, does anyone have any interesting ideas for how this could be used? The RUST_LOG=debug
one looks like it'll be particularly useful as an easy way to see what network requests a given binary might be making.
so, like torify up until now? tried it on a couple of apps as a replacement, works fine. the rust build chain though, madonn'...