Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Are you sure? Because last I checked OpenSnitch used different techniques from namespaces, that seemed more brittle to me.


I was referring to "request user permission interactively and adjust access accordingly"... it can do that. It uses eBPF though




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: