every kid may install traffic monitor and see this leak,
traffic stops after editing sysctl.conf and lightdm.conf and setting false flag to those servers.
Dummy hacker-os with security holes ?
What version of Parrot are you running? (include version (e.g. 4.6), edition(e.g. Home//KDE/OVA, etc.), and architecture (currently we only support amd64) KDE AMD64
What method did you use to install Parrot? (Debian Standard / Debian GTK / parrot-experimental)
Debian GTK
Configured to multiboot with other systems? (yes / no)
YES
If you believe there is potential for improvements in certain configurations, you will have to be more specific.
What data is it sending that you dont like?
How often does it send it?
What configuration changes did you make to prevent it?
Do those changes effect the functionality of the program?
every unencrypted connection (http, pop3, smtp,…) leak data on his way to the target and back.
or did you mean listen on these ports?
please explain it!
Let us know if you find any bug or leaks that are not supposed to happen by default in the OS. Community & (Especially) Devs thrive to improve Parrot day after day