zlacker

[return to "Performance and telemetry analysis of Trae IDE, ByteDance's VSCode fork"]
1. efitz+Ye[view] [source] 2025-07-27 19:49:02
>>segfau+(OP)
Two thoughts:

1. Try using pi-hole to block those particular endpoints via making DNS resolution fail; see if it still works if it can’t access the telemetry endpoints.

2. Their ridiculous tracking, disregard of the user preference to not send telemetry, and behavior on the Discord when you mentioned tracking says everything you need to know about the company. You cannot change them. If you don’t want to be tracked, then stay away from Bytedance.

◧◩
2. nosrep+Of[view] [source] 2025-07-27 19:56:08
>>efitz+Ye
Why use pihole? Most OSes have a hosts file you can edit if you're just blocking one domain.
◧◩◪
3. meindn+ok[view] [source] 2025-07-27 20:31:03
>>nosrep+Of
Hate to break it to you, but /etc/hosts only works for apps that use getaddrinfo or similar APIs. Anything that does its own DNS resolution, which coincidentally includes anything Chromium-based, is free to ignore your hosts file.
◧◩◪◨
4. gruez+al[view] [source] 2025-07-27 20:36:35
>>meindn+ok
But pi-hole seems equally susceptible to the same issue? If you're really serious about blocking you'd need some sort of firewall that can intercept TLS connections and parse SNI headers, which typically requires specialized hardware and/or beefy processor if you want reasonable throughput speeds.
◧◩◪◨⬒
5. neuros+Jv[view] [source] 2025-07-27 22:02:58
>>gruez+al
I configured my router to redirect all outbound port 53 udp traffic to adguard home running on a raspberry pi. From the log, it seems to be working reasonably enough, especially for apps that do their own dns resolution like the netflix app on my chromecast. Hopefully they don't switch to dns over https any time soon to circumvent it.
◧◩◪◨⬒⬓
6. efitz+jA[view] [source] 2025-07-27 22:46:01
>>neuros+Jv
DNS over https depends on the ability to resolve the DoH hostname via DNS, which is blockable via PiHole, or depend on a set of static IPs, which can be blocked by your favorite firewall.
◧◩◪◨⬒⬓⬔
7. gruez+tP[view] [source] 2025-07-28 01:30:02
>>efitz+jA
A sufficiently spiteful app could host a DoH resolver/proxy on the same server as its api server (eg. api.example.com/dns-query), which would make it impossible for you to override DNS settings for the app without breaking the app itself.
◧◩◪◨⬒⬓⬔⧯
8. dishso+F61[view] [source] 2025-07-28 05:13:42
>>gruez+tP
or it wouldn't even need to use any sort of dns. bit of a silly discussion.
[go to top]