eBPF
5 mentions across all digests
A Linux kernel technology that allows sandboxed programs to run in the kernel without modifying kernel source or loading modules, used by tools like Little Snitch for Linux for kernel-level network interception.
Bypassing DPI with eBPF, no VPN or proxy needed
eBPF kernel-level packet interception with TTL spoofing defeats DPI inspection without VPN or proxy infrastructure.
bpfvet: analyzes compiled .bpf.o files and reports minimum kernel version, helpers, maps, and portability issues
bpfvet brings kernel-version guardrails to eBPF development—an open-source analyzer that extracts minimum kernel requirements and portability constraints from compiled binaries across C, Rust, Go, and Zig for CI/CD enforcement.
How GitHub uses eBPF to improve deployment safety
GitHub published a technical deep-dive on how they use eBPF (extended Berkeley Packet Filter) to prevent circular dependencies in their deployment system. The approach selectively monitors and blocks deployment script...
LittleSnitch for Linux
Objective Development ports LittleSnitch to Linux using eBPF, bringing network visibility and rule-based filtering to the Linux desktop via a privacy-focused web UI.
Little Snitch for Linux
Obdev brings 20 years of network monitoring expertise to Linux via eBPF + Rust, revealing Ubuntu generates ~10x fewer system connections than macOS.