小 Snitch 来到 Linux,但核心逻辑是闭源的。
Little Snitch comes to Linux, but the core logic is closed source

原始链接: https://the.unknown-universe.co.uk/privacy-security/little-snitch-linux/

## Linux 上的 Little Snitch:一位自由开源软件爱好者的观点 Little Snitch(一款流行的 macOS 防火墙)登陆 Linux 引起了争论。虽然在技术上令人印象深刻——利用 eBPF 并用 Rust 编写——但其核心功能仍然是**闭源**的,这对许多自由开源软件倡导者来说是无法接受的。作者认为,在没有代码透明度的情况下信任安全工具本质上是自相矛盾的。 此外,他们认为 Little Snitch 是多余的。现有的解决方案,如 **AdGuard Home**,提供了高效的、网络级别的 DNS 过滤,在遥测数据到达单个系统*之前*将其阻止。这种方法更简单,并且可以保护所有设备,不同于特定于应用程序的防火墙。 对于应用程序级别的安全性,像 Wordfence 这样的工具已经足够了。虽然有些人认为 DNS 拦截器是不够的,但作者认为这在良好管理、开源的环境中很少成为问题。当需要更深入的检查时,他们提倡使用 **OpenSnitch**,一个完全开源的替代方案。 最终,作者倡导一种以自由开源软件为中心的安全性方法:透明的工具、边缘控制以及用于隐私和信任的自托管。

## 小 Snitch 来到 Linux - 摘要 小 Snitch 最近发布了 Linux 版本,在 Hacker News 上引发了讨论,主要围绕其部分闭源的性质。虽然一些人欢迎它作为另一种网络监控选项,但许多用户强调完全开源解决方案的重要性,尤其是在 Linux 环境中。 一些替代方案被提及,包括 OpenSnitch 和 macOS 上的 Lulu。用户们争论了便利性(例如小 Snitch 的 Web UI)与坚持 FOSS(自由和开源软件)理念之间的权衡。一些人认为,闭源安全工具需要一定程度的信任,这与 Linux 社区常见的自力更生的原则相冲突。 对话还涉及更广泛的网络隐私工具,如 Pi-Hole 和 AdGuard Home,对于 DNS 级别阻止与每个应用程序防火墙,人们有不同的看法。最终,核心要点是用户应选择符合其个人安全理念的工具,并了解使用闭源软件的含义,即使是为了看似有益的目的。
相关文章

原文

There is a bit of a stir in the Linux community this week. Little Snitch, the venerable gatekeeper of macOS network traffic, has finally made its way to our shores. On paper, it is an impressive bit of engineering. It utilises eBPF for high-performance kernel-level monitoring and is written in Rust, which is enough to make any technical enthusiast’s ears perk up. It even sports a fancy web UI for those who prefer a mouse to a terminal.

But as I looked closer, the gloss started to peel. While parts of the project are open, the core logic, the “brain” that actually decides what to block and how to analyse your traffic, is closed source.

For a FOSS enthusiast, this is a total non-starter. We don’t migrate to Linux just to swap one proprietary black box for another. If I cannot audit the code that sits between my binaries and the internet, I am not interested. A security tool that asks for blind trust is an oxymoron. In my home lab, if the code isn’t transparent, the binary doesn’t get executed. It is that simple.

However, beyond the philosophical “no-go” of proprietary code, there is a more practical reason I am passing on this: I have already solved this problem.

As I’ve detailed before on this blog in The DNS Safety Net, my primary line of defence is AdGuard Home. By handling privacy at the DNS level, I have a silent, network-wide shield that catches the vast majority of telemetry, trackers, and “phone home” attempts before they even leave my Proxmox nodes.

Running a central DNS blocker is fundamentally more efficient than managing an application firewall on every single VM and container. I don’t get interrupted by annoying pop-ups every time a system process needs to check for updates. I set the rules once at the edge, and my entire network, including devices that cannot run a Snitch client, benefits. It is a set-it-and-forget-it solution that actually respects my time and my privacy.

Even at the application level, I already have better alternatives in place. For this blog, I use Wordfence. It acts as a localised firewall, monitoring for malicious traffic and unauthorised changes right at the source. Between network-wide DNS filtering and application-specific security, the layers are already there. Adding a proprietary binary into that mix adds complexity without adding meaningful trust.

Now, the “security experts” will tell you that a DNS-style blocker is “too high level.” They will point out that it cannot see direct IP connections that bypass DNS. While technically true, I have to ask: in a well-curated FOSS environment, how often is that actually happening? And if it is, would I really want to use a closed-source tool to find it?

If I ever needed to track down which specific application is making suspicious outbound connections, I would turn to OpenSnitch, the fully open-source, community-driven application firewall for Linux. It is not as polished as the new Little Snitch port, but every line of its code is open for inspection and it does not ask for blind trust.

The arrival of Little Snitch on Linux is a sign that the mainstream is finally waking up to the “chatty” nature of modern software. But we do not need to import the proprietary culture of macOS to stay safe. We have better, more open ways to build our walls.

My network is quiet, my logs are clean, and my gatekeeper is a piece of transparent software I host myself. Until a tool comes along that respects both my privacy and the FOSS ethos I live by, that is not going to change. If you are serious about your own data, you should keep your gatekeepers open and your network controlled at the edge.

联系我们 contact @ memedata.com