While experimenting with Wayland, which has nothing to do with what I found, I noticed wifi activity when my browser wasn't open. Curious, I ran ss and noticed:
Using whois I found that 96.17.53.210 was akamai, a CDN (Content Delivery Network). It turns out that they use p2p to exploit users bandwidth, even if the user didn't give them permission. I found akamai was generating up to a dozen streams to store its content on my SSD and to deliver it to others whose browsing led to an akamai connection.
I tracked the app down, but it is ephemeral:
The problem is that plasmashellKOTClr.6.slave-socket doesn't exist where its path says it should exist. When I end the process, there are always two (one to receive and store content and the other to send to the final destination?) and if I terminate them another pair pops up almost immediately, so a hidden process is triggering the regens.
The last thing to consider is that this process is, in effect, an intrusion into my desktop, at least at the user level. It wouldn't take a keyboard logger long to catch my password and the game would be over. I'm continuing to explore the situation but wanted to pass on what I knew so far.
tcp ESTAB 0 0 192.168.1.100:57590 96.17.53.210:https
tcp ESTAB 0 0 192.168.1.100:57588 96.17.53.210:https
tcp ESTAB 0 0 192.168.1.100:57588 96.17.53.210:https
I tracked the app down, but it is ephemeral:
The problem is that plasmashellKOTClr.6.slave-socket doesn't exist where its path says it should exist. When I end the process, there are always two (one to receive and store content and the other to send to the final destination?) and if I terminate them another pair pops up almost immediately, so a hidden process is triggering the regens.
The last thing to consider is that this process is, in effect, an intrusion into my desktop, at least at the user level. It wouldn't take a keyboard logger long to catch my password and the game would be over. I'm continuing to explore the situation but wanted to pass on what I knew so far.
Comment