zlacker

[return to "Performance and telemetry analysis of Trae IDE, ByteDance's VSCode fork"]
1. efitz+Ye[view] [source] 2025-07-27 19:49:02
>>segfau+(OP)
Two thoughts:

1. Try using pi-hole to block those particular endpoints via making DNS resolution fail; see if it still works if it can’t access the telemetry endpoints.

2. Their ridiculous tracking, disregard of the user preference to not send telemetry, and behavior on the Discord when you mentioned tracking says everything you need to know about the company. You cannot change them. If you don’t want to be tracked, then stay away from Bytedance.

◧◩
2. nosrep+Of[view] [source] 2025-07-27 19:56:08
>>efitz+Ye
Why use pihole? Most OSes have a hosts file you can edit if you're just blocking one domain.
◧◩◪
3. meindn+ok[view] [source] 2025-07-27 20:31:03
>>nosrep+Of
Hate to break it to you, but /etc/hosts only works for apps that use getaddrinfo or similar APIs. Anything that does its own DNS resolution, which coincidentally includes anything Chromium-based, is free to ignore your hosts file.
◧◩◪◨
4. gruez+al[view] [source] 2025-07-27 20:36:35
>>meindn+ok
But pi-hole seems equally susceptible to the same issue? If you're really serious about blocking you'd need some sort of firewall that can intercept TLS connections and parse SNI headers, which typically requires specialized hardware and/or beefy processor if you want reasonable throughput speeds.
◧◩◪◨⬒
5. ses198+Cx[view] [source] 2025-07-27 22:19:44
>>gruez+al
You can’t just intercept tls, unless you can control the certificate store on the device.
◧◩◪◨⬒⬓
6. Andory+8B[view] [source] 2025-07-27 22:55:21
>>ses198+Cx
In the context of snooping on the SNI extension, you definitely can.

The SNI extension is sent unencrypted as part of the ClientHello (first part of the TLS handshake). Any router along the way see the hostname that the client provides in the SNI data, and can/could drop the packet if they so choose.

[go to top]