This toolkit provides comprehensive monitoring, analysis, and blocking capabilities for network telemetry sent by The Foundry's Nuke compositor on Linux. Key features: - Network monitoring scripts with automated alerts - Multi-tier blocking methods (hosts, firewall, namespace, AppArmor) - Detailed packet capture analysis and documentation - EULA legal analysis and privacy assessment - Sanitized example captures and comprehensive guides All sensitive data (personal IPs, usernames, packet captures) removed. Ready for public sharing on Gitea.
1.1 KiB
1.1 KiB
- Startup Capture:
┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
└─➜ tshark -r startup.pcap -q -z io,stat,0
tshark: The file "startup.pcap" doesn't exist.
- Local database check:
┌─~
└─➜ find ~/Documents/nuke ~/.nuke -name "*.db" -ls
6199816 1240 -rw-r--r-- 1 nicholai nicholai 1269760 Oct 23 18:46 /home/nicholai/.nuke/.sync_8178bafde38a.db
- System file access trace:
┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
└─➜ sudo strace -e trace=open,openat -p $(pgrep -f Nuke) 2>&1 | grep -E '/proc|/sys|/etc|registry' | tee nuke_system_access.log
rg: error parsing flag -E: grep config error: unknown encoding: /proc|/sys|/etc|registry
┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
└─➜ sudo strace -e trace=open,openat -p $(pgrep -f Nuke) 2>&1 | grep '/proc|/sys|/etc|registry' | tee nuke_system_access.log ┌─obsidian-vault/2-projects/Nuke-monitoring/dump/02
└─➜