check lsmod
before and after see what kernel modules are changing.
also look at dmesg
for interesting kernel messages as you attempt to use / not use the offending hardware.
check lsmod
before and after see what kernel modules are changing.
also look at dmesg
for interesting kernel messages as you attempt to use / not use the offending hardware.
tcpdump, wireshark can capture packets.
haproxy can be a proxy of many networking protocols
mitmproxy can help see encrypted traffic by acting as a literal man in the middle.
ssh with certain parameters can become a SOCKS5 proxy to encrypt and tunnel traffic out of a hostile network
Brave browser does an okay job, but remember under the hood everything is just a re-skinned Safari browser. There are content blockers, but AdBlock sold out (allows ads) and uBlock Origin doesn’t work on iOS due to limitations Apple has in place.
There, their its are not it’s they’re its. It’s as simple as “its”, as it’s the its it’s.
dmesg | less
should allow you to scroll the output. You should use forward slash inless
to search for the devices (hit enter), see if the modules are being loaded or if there some errors.