Now that half the world knows, I might as well tell you that I used balenaEtcher to flash an image onto a USB memory key.

balenaEtcher

I launched the app on a Mac on which I still have Little Snitch installed, a program which alerts me of outgoing connections attempted by programs on my Mac. I can then, on a per/program and per/connection basis, decide whether I wish to allow that connection and, if so, for just once or forever.

This is the list of connections initiated I was requested to approve from the already installed app:

etcher.io on TCP port 80 (http)
balena.io on TCP port 80 (http)
s3-1-w.amazonaws.com on TCP port 443 (https)
fullstory.com on TCP port 443 (https)
d1l6p2sc9645hc.cloudfront.net on TCP port 443 (https)
a.impactradius-go.com on TCP port 443 (https)
www.google.com on TCP port 443 (http
accounts-cctld.l.google.com on TCP port 443 (https)
cse.google.com on TCP port 443 (https)
rs.fullstory.com on TCP port 443 (https)
api.mixpanel.com on TCP port 443 (https)
sentry.io on TCP port 443 (https)
stats.l.doubleclick.net on TCP port 443 (https)
data2.gosquared.com on TCP port 443 (https)
data.gosquared.com on TCP port 443 (https)
assets.balena.io on TCP port 443 (https)
code.jquery.com on TCP port 443 (https)

That was the list of connections I was requested to approve. To copy an image onto a USB memeory key. I don’t even.

Update: prompted by Tony, I checked; it appears to be an Electron app.

$ strings balenaEtcher
ELECTRON_RUN_AS_NODE