Introducing oniux: Kernel-level Tor isolation for any Linux app
Introducing oniux: Kernel-level Tor isolation for any Linux app

Introducing oniux: Kernel-level Tor isolation for any Linux app | Tor Project

Introducing oniux: Kernel-level Tor isolation for any Linux app
Introducing oniux: Kernel-level Tor isolation for any Linux app | Tor Project
Other than the example uses provided in the article, does anyone have any interesting ideas for how this could be used? The RUST_LOG=debug
one looks like it'll be particularly useful as an easy way to see what network requests a given binary might be making.
Would be cool if this could work on Android and essentially be able to pick and choose which apps to run over Tor.
You mean like orbot?
Sort of. Orbot is fine but for it to work it does have to modify the system's networking. It installs itself as a VPN so if I try to use it it'll kick me off the VPN my Android was already using. So yes Orbot can sort of let me pick apps to run over Tor but to do so it forces me off-VPN for all my other apps. Maybe that's an Android limitation or an Orbot quirk, not really sure.
The nice thing about this new Oniux is that it works more like a container for applications rather than have to modify the system's network.