OpenSnitch, an application-based firewall, protects you from unwanted data leaks by letting you set customized rules for all your applications.
An application opening a connection to the Internet is a normal procedure and typically completely legitimate, but there are programs – even open source applications – that like to phone home or track the user. On Linux, there is usually an opt-in step – you have to actively agree to the data collection. Often, the collected data relates to telemetry functions and gives the developers information about a user’s interaction with their program. However, open source does not always protect you against being investigated. In Firefox, you have to actively opt out of sending telemetry stats if you do not want this to happen.
An application firewall can reveal what’s going on behind the user’s back. While conventional firewalls examine the data flow packets to and from the CPU, an application firewall takes an application-specific view when monitoring the outgoing data flow. (Do not confuse an application firewall with a web application firewall .) Examples of application firewalls include FirePrompt  for Linux and GlassWire  for Windows. In this article, I’ll take a closer look at an open source application firewall: OpenSnitch , a Python port of the proprietary Little Snitch  personal firewall for macOS. OpenSnitch development began about four years ago.
With “snitch” in its name, you can tell much about how OpenSnitch works: Snitching is exactly what this firewall does. OpenSnitch analyzes applications’ outgoing data traffic and exposes trackers and similar unpleasantries if configured accordingly, letting you intervene if necessary. In general, if an application tries to connect to the network, OpenSnitch stops it first and asks if you want to allow this to happen. You grant permission by defining a rule for the application.
Use Express-Checkout link below to read the full article (PDF).