Bareass Mullvad

How any app can rip these VPNs down without sudo

Bareass Mullvad



Video Format

We have a short demo video to explain these concepts and showcase the tool. If you are new to these concepts, please see the video first: Video Link


No Sudo to Doxx

Traditional VPNs such as Proton and Mullvad are vulnerable on Linux to be immediately ripped down by any application without even needing sudo permission. An attacker can do so by using the DBUS, to take down virtual networking interfaces. By not even requiring sudo to rip down networking interfaces, the way Linux handles DBUS, provides a clear-cut method for any app to doxx a user behind a VPN. Once the real IP address is visible, then any app can then do an API call to any server for doxxing. When we consider that having multiple web browsers for resisting fingerprinting means installing large amounts of new software. And when combined with any potential web browser vulnerability, or even malicious intent from Mozilla, Google, or other apps, this is a dangerous path for the privacy of end-users to be potentially compromised by sophisticated attackers.


Bubblewrap DBUS

To deal with these types of threats, HydraVeil bubblewraps the DBUS to prevent apps from touching the host’s networking interfaces and taking them down. This provides much stronger protection for the layer-1 ‘host’ Wireguard from these types of attacks.



All Apps Inside HydraVeil

HydraVeil’s protection is automatic for all apps found in the Linux app. This is currently web browsers at the time of this writing, but we are looking to expand to chat apps, email clients, and other useful apps. The init.ptl has the bwrap information, and further documentation on our entire strategy for security can be found in our yellow page paper.



BareAss Naked Tool

Simplified Privacy presents an original script for ripping down Mullvad & Proton VPNs without needing sudo, by abusing the DBUS and network interfaces. Any app can easily do these same types of actions, and unfortunately the vast majority of VPNs are exposed. Now this demo implementation just rips down the VPN, but in the wild, any app could make an API call to a server the attacker controls. Please see our self-host git for the code:
https://git.simplifiedprivacy.com/SimplifiedPrivacy/bareass_mullvad


Tool’s Use:

The following are commands to use the BareAss Naked Tool.


List Interfaces

The user can list all interfaces.

bash bareass.sh list  



Butt Naked Mullvad

Kill Mullvad, through their “lockdown” mode"

bash bareass.sh kill-mullvad    

Please see our podcast on Mullvad’s other poor decisions. Also our yellow paper’s key section, discusses disagreement with their multi-hop strategy.


Rip Down Proton

First list the interfaces, see a proton interface and take it down:

bash bareass.sh kill proton0  

Please see our article on Proton’s negligence for other critical points we disagree with them on.


Proof of Concept DBUS Protection

To showcase what apps (such as a web browser) can do or access from inside the bubblewrap, do the following with the layer-one system-wide VPN already on:

bash bareass.sh bwrap-kill wg  

And once again to repeat, all the apps inside HydraVeil have this automatically. This script is just a demonstration of the attack being done from inside the Bwrap. So you’re experiencing being denied from the point of view of the app.



If you really want to learn and take your privacy to the next level, Learn about HydraVeil, Access our VPN, and subscribe to our new content via: Arweave Video RSS, Podcast RSS, Session list, Nostr, Bastyon, Article RSS, or join the Signal Group

Related Posts

Why a Nostr VPN?!

Why a Nostr VPN?!

How should node operators identify themselves?

[SP]

Dec 17, 2025

How a Nostr VPN Works

How a Nostr VPN Works

Node operators verify their identity?!

[SP]

Dec 17, 2025

Why Run a HydraVeil Node

Why Run a HydraVeil Node

Get Paid, Help Nostr, Help Privacy, & Be Part of Something

[SP]

Dec 17, 2025

Node Operator Checklist / Overview

Node Operator Checklist / Overview

Start Here if You're Interested in Hosting a HydraVeil Node

[SP]

Dec 17, 2025