Im trying to troubleshoot Signal's downloading of mms so i enabled notifications on AFWall.
Literally every few seconds i get a notification AFWall blocked Linux kernel (-11) and some random ip. From what i can tell its never the same ip. What's it doing? Why is it connecting so much?
While the connections are blocked, i dont experience any lack of service with any of my apps so its evident whatever its doing isnt important.
I am running the latest Lineage nightly rom with microg & tingle. Minimal apps.
Two ips I was able to record (notification is too quick)
208.58.153.10:443
192.96.204.169:443
Sparse info online. The 208 ip belongs to an organization at 650 College Rd E, Princeton NJ but that appears to be an office building. Not sure who "RCN Corporation" is and what data they're taking or sending to my phone.
The other ip belongs to lease web so could be anything, as they're a server farm.
z0m8i3 said:
Im trying to troubleshoot Signal's downloading of mms so i enabled notifications on AFWall. Literally every few seconds i get a notification AFWall blocked Linux kernel (-11) and some random ip. From what i can tell its never the same ip. What's it doing? Why is it connecting so much? While the connections are blocked, i dont experience any lack of service with any of my apps so its evident whatever its doing isnt important. I am running the latest Lineage nightly rom with microg & tingle. Minimal apps.
Click to expand...
Click to collapse
z0m8i3 said:
Two ips I was able to record (notification is too quick) 208.58.153.10:443 192.96.204.169:443 Sparse info online. The 208 ip belongs to an organization at 650 College Rd E, Princeton NJ but that appears to be an office building. Not sure who "RCN Corporation" is and what data they're taking or sending to my phone. The other ip belongs to lease web so could be anything, as they're a server farm.
Click to expand...
Click to collapse
That's really odd behavior...
What i would do, personally, is to post this question within some type of thread that covers the Linux Kernel or even a guide for it since the members within those threads are better versed with the Linux Kernel.
I had performed a quick search and here's just a few threads that seem to fit this area regarding the Linux Kernel.
[Guide][How To] Unpack/Repack Kernel [Windows/Linux] by khan_frd2002
[HOW_TO] BUILD a LINUX KERNEL FROM SOURCE [UBUNTU] by #buzz
[GUIDE][LINUX][TOUCHWIZ]Kali Nethunter on Galaxy Note 3 Exynos[Kernel] by daoudedy
I wish you the best of luck!
"Live Long and Prosper..."
~Ambassador S'chn T'gai Spock
Sent via Communicator [D2VZW] from the Bridge of the U.S.S. Enterprise
Would these threads be applicable eventhough they aren't Lineage related?
Most recent IPs:
34.197.178.240
209.58.153.9
207.244.72.9 { xda comes up for the first three digits? I dont have any app for xda, i access the site through firefox.
Anyone else with AFWall experience this when the notifications are enabled?
z0m8i3 said:
Would these threads be applicable eventhough they aren't Lineage related?
Most recent IPs:
34.197.178.240
209.58.153.9
207.244.72.9 { xda comes up for the first three digits? I dont have any app for xda, i access the site through firefox.
Anyone else with AFWall experience this when the notifications are enabled?
Click to expand...
Click to collapse
I've never encountered that and wouldn't know where to specifically post this question.
I can only think of asking within the closest thread to match the issue.
I wish I had an answer for you...
"Live Long and Prosper..."
~Ambassador S'chn T'gai Spock
Sent via Communicator [D2VZW] from the Bridge of the U.S.S. Enterprise
You've got me paranoid now
Are my settings 'too high,' perhaps?
I'm a bit disturbed there's no info about any of these ips accessing my phone. If they were legit services, one would assume they'd identify themselves clearly.
Interestingly, i disabled whatsapp from running in the background and 23 minutes went by until afwall blocked linux kernel requests.
Once i fired up firefox, they persist.
Linux kernel request to 66.218.75.98:993... I have a yahoo account. So i definitely need to tweak my permissions.
https://play.google.com/store/apps/details?id=com.antispycell.connmonitor
Nice tool for just monitoring connections. Maybe even monitor a fully unblocked system and see how it behaves then. I can for example see Android System listed. Clicking on that I can see what else is using the same ip number. So basically I can track what possibly triggers the ip connection to begin with.
Sent from my XT1650-03 using Tapatalk
Some of the reviews on that app creep me out a bit.. seems like it adds noise to the outbound connections and has unnecessary permissions.
This seems to be the only other mention on the web about this: https://android.stackexchange.com/q...rnel-need-an-internet-connection-all-the-time
I too, disabled all internet access to the kernel and I've not noticed any changes. Are apps routing their updates through the kernel or something?
z0m8i3 said:
Some of the reviews on that app creep me out a bit.. seems like it adds noise to the outbound connections and has unnecessary permissions.
This seems to be the only other mention on the web about this: https://android.stackexchange.com/q...rnel-need-an-internet-connection-all-the-time
I too, disabled all internet access to the kernel and I've not noticed any changes. Are apps routing their updates through the kernel or something?
Click to expand...
Click to collapse
Not sure every bad review is from someone that actually have a clue about different tcp connection states.
Even a xda thread about this app.
https://forum.xda-developers.com/showthread.php?t=2471272
Sent from my XT1650-03 using Tapatalk
The "Case of the Princeton Ping" Has Been Solved!!!
@z0m8i3, I just figured out why and where the reference to Princeton is coming from!
I accidentally bumped into this while something caught my eye regarding Servers/Mirrors that Lineage is using for the LineageOS Distribution.
I couldn't believe the amount of Servers that are hosting the LineageOS and... Drumroll Please... The Princeton reference is to the Princeton University Server AND it's a legitimate one too!!!
If you go to, the following link, you'll see a device list and within them are all the downloads for the LineageOS that matches the Official LineageOS website.
http://mirror.math.princeton.edu/pub/lineageos/full/
I had found about a dozen +/- different Servers/Mirrors that Lineage uses. There's even a Czech and Russian Server (to name a few).
Your device is actually communicating with the Princeton Server, more than likely, for LineageOS updates.
The "Case of the Princeton Ping" has been solved!
Just call me Sherlock Holmes... LMAO !!!
***Please Note: As always, I welcome any member to help with further valuable information/clarification for any of my posts.
Sent via Communicator [D2VZW] from the Bridge of the U.S.S. Enterprise...
Ibuprophen said:
[MENTION=7378950]
Your device is actually communicating with the Princeton Server, more than likely, for LineageOS updates.
Click to expand...
Click to collapse
This is certainly interesting..
To test this theory, I kept the kernel blocked in AFWall and attempted to install the latest update (which was successful and occurred without issue).
I'm not sure what server my update came off of (I didn't monitor the connection) but keeping the Linux kernel disabled in AFWall appears to have no negative consequence; I can browse the web normally, download apps from Yalp and Fdroid, text/send/receive MMS on Signal.. there's seemingly no functional purpose to the kernel's web access, from what I can tell.
I am desperately curious as to what it tries to access the web so many times for.
Related
DroidSheep is an Android application that demonstrates security weaknesses (not using https) and is capturing facebook, twitter, linkedin , yahoo, and other accounts.
PS> this is NOT my work, nor do i intend it to be taken as my work, I just wanted to share with the community!
NOTE FROM THE GERMAN DEVELOPER:
DroidSheep was developed as a tool for testing the security of your accounts.
This software is neither made for using it in public networks, nor for hijacking any other persons account.
It should only demonstrate the poor security properties network connections without encryption have.
So do not get DroidSheep to harm anybody or use it in order to gain unauthorized access to any account you do not own! Use this software only for analyzing your own security!
So do not get DroidSheep to harm anybody or use it in order to gain unauthorized access to any account you do not own! Use this software only for analyzing your own security!
Now>
WHAT DO YOU NEED?
1. A rooted phone (no, it will for sure not work without root)
2. The App installed on the phone (latest build attached to the present post)
3. A WIFI network to test it on
How do you use it?
DroidSheeps main intention is to demonstrate how EASY it can be, to take over nearly any internet account. Using DroidSheep any user – even without technical experience – can check if his websession can be attacked or not. For these users it is hard to determine, if the data is sent using HTTPS or not, specially in case of using apps. DroidSheep makes it easy to check this.
This video demonstrates what DroidSheep can do:
http://droidsheep.de/?page_id=14
How does it work?
As already announced DroidsSheep supports almost every website – also “big” webservices like facebook and Yahoo.
How does that work this simple?
There are many users that do not known that air is the transmission medium when using WiFi. Therefore information is not only transfered to its receiver but also to any other party in the network within the range of the radio waves.
Usually nothing special happens because the WiFi users discard packets that are not destined to themselves. DroidSheep does not do this. It reads all the packets looking at their contents.
Is a website sending a clear recognition feature within a message’s content, which can identify a user (“SessionID”), then DroidSheep is able to read it although it is not intended to external users. Moreover DroidSheep can use this token to use it as its own. The server can’t decide whether the authorized user or DroidSheep has sent the request.
http://droidsheep.de/?page_id=424
How can I protect myself?
The only satisfying answer is: SSL respectively HTTPS.
Many providers already offer HTTPS, even facebook, however it must often be enabled in the settings first.
When using HTTPS the data are still sent to alle participants in the WiFi-network, too, but because the data has been encrypted it is impossible for DroidSheep to decrypt the contect of a message - remaining only a complete mess of letters, with which an attacker can’t do anything.
The real problem is that not every website provides SSL. What to do when you are in a public network (hotel, airport, etc.), you also want to use this and the site does not offer HTTPS though?
You can use a VPN-connection
For this the computer sets up an encrypted channel to a confidential computer which again transfers the data to the website.
You can also install DroidSheep Guard from the Market:
https://play.google.com/store/apps/details?id=de.trier.infsec.koch.droidsheep.guard.free&hl=en
A very interesting feature is the possibility to save cookies!!
Source> http://droidsheep.de
Imagine the possibilities....
This isn't good dude.
And 'air' isn't the 'transmission medium' for WiFi. We figured that out when we discarded the ether hypothesis around a century ago.
backfromthestorm said:
This isn't good dude.
And 'air' isn't the 'transmission medium' for WiFi. We figured that out when we discarded the ether hypothesis around a century ago.
Click to expand...
Click to collapse
-what exactly "isn´t good" ?
Ok you are correct, yes, WIFI (as any other electromagnetic wave) can also be transmitted through vacuum, so yes there is no need of "air"
Re-ported to a MOD I don't think this should be shown or talked about on XDA this isn't an hacking site like you might think for taking advantage of other peoples accounts.
XDA is a hacking community for the good like Rooting.
This app has been on XDA for quite a while http://forum.xda-developers.com/showthread.php?t=1593990
Even a portal article about it http://www.xda-developers.com/android/droidsheep-undresses-network-security-and-shows-how-its-done/
Please use the main thread to discuss this app, not this one.
@ shankly1985, we appreciate your concern, but people need to know how insecure important accounts can be. Thus enabling them to make the changes to fix them.
Thread Closed.
I was a bit confused about how to use OpenVPN on an Android device because there was so little information around. I thought I'd post this to make it easy for others. It turns out to be very simple. I have an Android phone (Note 2, Jellybean) rooted and Busybox installed, but neither is necessary.
The following steps relate to using an Android device with a commercial vpn service (like an anonymizing service amoung others), but they should help clarify in other situations.
Step 1: download the OpenVPN config files from your vpn provider.
Step 2: download, install and start "OpenVPN for Android by Arne Schwabe" (O4A) (get it from any android app source, it's free, but donation to the author is optional and its a great app).
Step 3: on the "VPN Profiles" page of O4A, use the folder icon upper right to browse to the .ovpn config file for a server, select, and save it on the following page. The server name will appear on the Profiles page.
Note: Sometimes the server config files include a .p12 file which O4A will want to import, then require a password to decrypt...just uncheck that file (upper left) before saving; later O4A will ask for a password, just leave it blank and hit "OK", it will connect just fine (at least with my vpn provider).
Step 4: open the settings for the server you just imported (icon to the right of the server name), navigate to the "Basic" page, and enter your username and password at the bottom of the page (if your provider uses the u/p type connection). YOU ARE DONE (but, you will need to repeat this for each server you want to use).
Step 5: tap on the server name on the "Profiles" page, O4A will open the log file and you will see it going through the steps of the connection process in both the log and the notification bar . When it's finished successfully, you'll see "connected". You can check the connection in the log file. Also depending on your device the connection will show in the notification bar for as long as its connected. You can disconnect by tapping the notification.
The correct configuration settings for OpenVPN are usually included in the .ovpn file, so you likely won't need to change any config setting in O4A. However, you can add the line "auth-nocache" to the .ovpn file manually or add it on the O4A page "Advanced -> Custom Options". This will prevent the username/password from being cached if that's important to you.
NOTE: Using dnsleaktest.com I have noticed that google dsn servers appear sometimes as a dns server. This might represent a dns leak as there would seem to be no reason, for example, for a European located server to use a U.S. located google dns server. I'm not clear about why the google servers are showing up, maybe someone can verify/clarify.
However, you can force a dns server of your choosing by going to the "IP and DNS" page of the server config settings in O4A, and select "Override DNS Setting by Server". You can then use the default dns servers chosen by the author or enter your own.
Enjoy!
What is your choice server? I see free and fee ones, but wondering about true encryption security too.
I'm just now looking into this, and am curious at what point vpn should be considered or if it's overkill for me.
Sent from my SGH-T889 using xda app-developers app
lyinelriche said:
What is your choice server? I see free and fee ones, but wondering about true encryption security too.
I'm just now looking into this, and am curious at what point vpn should be considered or if it's overkill for me.
Sent from my SGH-T889 using xda app-developers app
Click to expand...
Click to collapse
IMHO, anyone who cares about their privacy should use a vpn. It does give you privacy on the web. Otherwise all your net activity, email, messaging, etc.are recorded by your ISP as well as snooped by various international TLAs (three letter organizations i.e. FBI, NSA, CIA, GRU, etc) and commercial entities seeking to monetize your information.
There are many vpn services around, some good, some very bad. After doing some research, I've been using Perfect-Privacy.com for a few years. Some of the things I like about them are: you can sign up and pay anonymously, They have over 40 servers in some 20 countries. You can switch between servers from your machine in seconds. You can chain 2 or more servers for even stronger privacy (though you probably don't need that). They have free port forwarding (needed for some p2p progs). They do not log anything anytime. They donate part of their server bandwidth to the TOR project. Their servers are fast (I can dl at my ISP's cap speed (@12 mb/s) but PP's bandwidth is much higher if you can use it). There's no limit on your traffic. Their up time is very good...occasionally a server goes down, but they get it fixed timely and with 40 servers to choose from its not a problem. Their staff is friendly and responsive (though you should plan on following instructions for setup...pretty easy). They use OpenVpn with AES-256 bit encryption which is currently unbreakable (PPTP and L2TP are hackable) (they also provide access via SSH2, Socks 5, Squid, PPTP and L2TP). My take is that they are very committed to privacy; Overall I think the quality of their service is excellent. All that said, they are a bit more expensive than some vpns, but worth it IMO. You can sign up for one month to try it out, then apply that to a cheaper longer time if you like it.
BTW, you could use TOR (The Onion Router) to check out using a vpn. Its a great project, open-source and free! Its a bit slow because it chains through three servers and all the nodes/bandwidth are donated. But it works well and is a great great service to those who understand that privacy is important. Be aware that the TOR admins ask people not to use it for p2p because that lags down the system.
Hope that helps. Good luck
I am not going to pretend that I understand everything you wrote, but I think I know what you mean by P2P, and that is exactly the reason why I'm considering Vpn in the first place. That being said, I really appreciate you letting me pick your brain about it.
Sent from my SGH-T889 using xda app-developers app
lyinelriche said:
I am not going to pretend that I understand everything you wrote, but I think I know what you mean by P2P, and that is exactly the reason why I'm considering Vpn in the first place. That being said, I really appreciate you letting me pick your brain about it.
Sent from my SGH-T889 using xda app-developers app
Click to expand...
Click to collapse
Glad to help. BTW TOR has a free web browser package with the TOR function already built in. Just download it, install and you're up and ready to browse anonymously. Easier than that it doesn't get Search for TOR, you'll find it.
For months now i've had problems using xda. The loading would hang and wait. If I looked at the developer tools in chrome, I can clearly see that for some reason it was constantly pending loading at objects attached to hosts like this:
www1-lw.xda-cdn.com
www2-lw.xda-cdn.com
forum.xda-cdn.com
forum-lw-1.xda-cdn.com
forum-lw-2.xda-cdn.com
It was failing to load with Chrome on Android, Linux, and Windows. Firefox would load correctly. Interesting thing is that when I connect via a VPN and then test with Chrome it would load fine. I would say it is just my IP address and routing but this has been over a period of time when my ISP IP address has changed. I've verified that and it is still an issue. I have no other issues with any other site.
If there are details I can provide, let me know. If this is the wrong forum for a problem like this, let me know that too. I've gotten to the point that I block the listed cdn addresses in my hostfile so that they immediately fail and my pages load but obviously that rids me of images and other elements along with not letting you guys recoup cost for ADs.
There seems to be something with the CDNs XDA uses.
calisro said:
For months now i've had problems using xda. The loading would hang and wait. If I looked at the developer tools in chrome, I can clearly see that for some reason it was constantly pending loading at objects attached to hosts like this:
www1-lw.xda-cdn.com
www2-lw.xda-cdn.com
forum.xda-cdn.com
forum-lw-1.xda-cdn.com
forum-lw-2.xda-cdn.com
It was failing to load with Chrome on Android, Linux, and Windows. Firefox would load correctly. Interesting thing is that when I connect via a VPN and then test with Chrome it would load fine. I would say it is just my IP address and routing but this has been over a period of time when my ISP IP address has changed. I've verified that and it is still an issue. I have no other issues with any other site.
If there are details I can provide, let me know. If this is the wrong forum for a problem like this, let me know that too. I've gotten to the point that I block the listed cdn addresses in my hostfile so that they immediately fail and my pages load but obviously that rids me of images and other elements along with not letting you guys recoup cost for ADs.
There seems to be something with the CDNs XDA uses.
Click to expand...
Click to collapse
how is your internet connection? and do you use a an add blocker?
simms22 said:
how is your internet connection? and do you use a an add blocker?
Click to expand...
Click to collapse
Connection is fine. Its a 100M UP/DOWN connection. No adblocking. Zero issues for anything else. I stream a lot of data from various sources. Im a very heavy user and never have any issues with any site but XDA. The fact that it works over the VPN is interesting since it would route it through a different path. The fact that it loads fine without the VPN connection in firefox only is also interesting. As I said, this has been going on for a long time. I'm quote sure it isn't my 'connection'. Of course it could be routing or a problem with the CDNs.
All other page elements load correctly except for all the CDN URLs according to the developer tools in Chrome. The problem is the page won't actually 'render' anything until the CDNs timeout.
calisro said:
Connection is fine. Its a 100M UP/DOWN connection. No adblocking. Zero issues for anything else. I stream a lot of data from various sources. Im a very heavy user and never have any issues with any site but XDA. The fact that it works over the VPN is interesting since it would route it through a different path. The fact that it loads fine without the VPN connection in firefox only is also interesting. As I said, this has been going on for a long time. I'm quote sure it isn't my 'connection'. Of course it could be routing or a problem with the CDNs.
All other page elements load correctly except for all the CDN URLs according to the developer tools in Chrome. The problem is the page won't actually 'render' anything until the CDNs timeout.
Click to expand...
Click to collapse
i know ill probably get a talking to, but try an ad blocker. xda is chalk full of ads, very very many! that could have an affect. btw, i use adfree http://adfree.odiousapps.com/adfree.apk
It goes further. Even with an adblocker, the page doesn't load properly. Some of those CDNs load real elements. So even with ads being blocked, page would still not load.
Same here. Browser is irrelevant. "Waiting for www1-lw.xda-cdn.com..."
I'm having the same issue. "Waiting for www1-lw.xda-cdn.com..."
calisro said:
For months now i've had problems using xda. The loading would hang and wait. If I looked at the developer tools in chrome, I can clearly see that for some reason it was constantly pending loading at objects attached to hosts like this:
www1-lw.xda-cdn.com
www2-lw.xda-cdn.com
forum.xda-cdn.com
forum-lw-1.xda-cdn.com
forum-lw-2.xda-cdn.com
It was failing to load with Chrome on Android, Linux, and Windows. Firefox would load correctly. Interesting thing is that when I connect via a VPN and then test with Chrome it would load fine. I would say it is just my IP address and routing but this has been over a period of time when my ISP IP address has changed. I've verified that and it is still an issue. I have no other issues with any other site.
If there are details I can provide, let me know. If this is the wrong forum for a problem like this, let me know that too. I've gotten to the point that I block the listed cdn addresses in my hostfile so that they immediately fail and my pages load but obviously that rids me of images and other elements along with not letting you guys recoup cost for ADs.
There seems to be something with the CDNs XDA uses.
Click to expand...
Click to collapse
Are you using chrome 53? Upgrade to Chrome application and platforms with version 55, then try again.
https://knowledge.rapidssl.com/supp...ntent&id=ALERT2165&actp=LIST&viewlocale=en_US
---
My chrome will load slow/hang if i visit xda(open many tabs) with whitelisted adblock(ublock). When hang I can see under taskmanager the page consuming 1gig+ ram. Sites like gsmarena is fine whitelisted, no performance issues so maybe you can see what they're doing right.
I haven't been able to go to the main xda page for over a week now on Chrome, with or without adblock on, it loads in IE but who wants to use that?
dave2103 said:
I haven't been able to go to the main xda page for over a week now on Chrome, with or without adblock on, it loads in IE but who wants to use that?
Click to expand...
Click to collapse
You can try Upgrade to Chrome application and platforms with version 55.
I have the same issue. The issue is not present in Firefox. Difference ? MAYBE due to the limit of open connections pr host in google is lower than in Firefox.
---------- Post added at 01:35 PM ---------- Previous post was at 01:33 PM ----------
Actually, disabling adblock plus helps.
jakobfriis said:
I have the same issue. The issue is not present in Firefox. Difference ? MAYBE due to the limit of open connections pr host in google is lower than in Firefox.
Click to expand...
Click to collapse
The issue is also present on Firefox and is rather network related. I often have issues loading xda at home and it stucks at opening www1-lw.xda-cdn.com, but at work it works fine almost ach time. This is happening for at least half a year now and there are days (not often tho) where everything loads instantly.
calisro said:
For months now i've had problems using xda. The loading would hang and wait. If I looked at the developer tools in chrome, I can clearly see that for some reason it was constantly pending loading at objects attached to hosts like this:
www1-lw.xda-cdn.com
www2-lw.xda-cdn.com
forum.xda-cdn.com
forum-lw-1.xda-cdn.com
forum-lw-2.xda-cdn.com
It was failing to load with Chrome on Android, Linux, and Windows. Firefox would load correctly. Interesting thing is that when I connect via a VPN and then test with Chrome it would load fine. I would say it is just my IP address and routing but this has been over a period of time when my ISP IP address has changed. I've verified that and it is still an issue. I have no other issues with any other site.
If there are details I can provide, let me know. If this is the wrong forum for a problem like this, let me know that too. I've gotten to the point that I block the listed cdn addresses in my hostfile so that they immediately fail and my pages load but obviously that rids me of images and other elements along with not letting you guys recoup cost for ADs.
There seems to be something with the CDNs XDA uses.
Click to expand...
Click to collapse
You should disable add blocker.
Same issue, waiting for www1-lw.xda-cdn.com on XDA frontpage, been like this for around a year now. uBlock is disabled. To remedy this, I have to load the XDA Forums in another tab, refresh XDA Frontpage and it's all working good
Same here. I would logon to the site way more often if this dind't happen.
Same here, @theBIGone, I see you're in Amsterdam as well, maybe it's location based as well?
Netherlands here too. Exact same issue.
I was having terrible lockups whilst browsing XDA for ages, to the point that I thought xda was running one of these CoinMining scripts on users. I actually enabled adblockers and the issue totally vanished. Weird.
This is about the captive portal login. (No gapps installed)
OK, I know, the system makes a quick login to a server in order to check the conncetion's health, and you (Los devs) chouse a Google server to avoid security risks, however, the server can keep data relevant to the identification of the device who loged in, as well as the exact time of loging in, along with the location info if the connection is done via WiFi.
...so I disabled the captive portal login by typing the order ''captive_portal_detection_enabled 0'' in the terminal (with SU access) and restarted my device.
...Guess what happened --> When I connected to WiFi, the exact same Google server was connected to the ''unified location'' (TCP6 established)
...so we are still forced to give up private data to Google.
Why are you doing this Los devs???
Some of us chose to use Lineage o.s. without gapps for privacy. Why are you letting us down???
Thank goodness after many hours of search I found a solution here https://www.reddit.com/r/privacy/comments/cldrym/how_to_degoogle_lineageos_in_2019/ along with solutions for other Los leaks, all relevant to Google. The solutions that I've tried from this page, seem to work quite well for now
Bro how are you getting in with Los?
Is it doing what we hope is intended - i.e. shielding from all things Google?
From reading that Reddit thread you kindly linked, it seems to me we are required to further degogle any Lineage OS installation?
Am I understanding this correctly?
I had initially assumed by successfully installing Los without gapps would be suffice.
But I now suspect that is not the case, the Reddit post leads me to believe a lot of tweaking is required to entirely degoogle the OS.
If you could please bring me upto date I'd seriously appreciate it ??
douleuei akoma to solution?
Hey,
As I see in LineageOS 17.1 changelog the captivate portal detection method had cutted off:
https://review.lineageos.org/c/LineageOS/android_packages_apps_SetupWizard/+/297483
So, in android 9.0 or higher if you set up the Private DNS option to, for example: dns.quad9.net you phone shoukd not contact with google anymore.
Or it is? When I wrote this I thinked where is the phone gets the time sync. After I read a lot the answer will be the same somehow: it uses some of the google domains, like time.android.com, so i set it up by hand (I rooted my phone), through a terminal with the following commands:
su
settings put global ntp_server 1.europe.pool.ntp.org
set the name whatever you like
Interesting Privacy article out 6 Oct, lots on the interweb today. Android in general, and also LineageOS discussed. There is the usual tradeoff between data needed for functionality and innovation vs just revenue. The point is it could be more transparent, and give users some choices.
Full article: https://www.scss.tcd.ie/Doug.Leith/Android_privacy_report.pdf
Eye_of_Osiris said:
Thank goodness after many hours of search I found a solution here
https://www.reddit.com/r/privacy/comments/cldrym
along with solutions for other Los leaks, all relevant to Google. The solutions that I've tried from this page, seem to work quite well for now
Click to expand...
Click to collapse
Its the year 2022 with LineageOS 18.1 installed and the post above is still relevant.
I used to always unlock bootloaders, install TWRP, flash clean Android and load up AdAway until my latest S20 acquisition. The intention was to wait out the 2yr warranty period and then do it until I learned that ad blocking was possible using the Private DNS setting.
Over the first days of using my new S20 I was really shocked at the volume of crap blasting at me that AdAway was blocking in the past, so trying out Private DNS was a welcome relief (dns.adguard.com).
It's only been a few days since I've done this and I just applied the setting to the wife's (stock) Huawei P20 Pro, and yes a large volume of ads are now missing, a sight for very sore eyes.
Just wondering if others have had positive and/or negative experiences using Private DNS for ad blocking. I saw Pixel 2s were rebooting but I'm sure the latest versions of Android would have sorted this by now. I haven't experienced anything untoward so far but I'm a very light user and only had the phone 4 days.
Works great for me! No more Blokada, DNS66, et al. Been using this since my Note 9.
Install youtube vanced and you're all set.
Tried dns.adguard.com before but some ads were still going through so i stuck to blokada, but now it seems to work fine, no more vpn icon
Used AdAway on rooted devices too ... with dns.adguard.com i had no problems while using it .... if you want, try this.. dns.keweon.center ..which i currently use...also excellent DNS
No need to use VPN Ad blockers.
Instead of dns.adguard.com use nextdns.io
Get free account and configure it as You want, with many filters full loging etc. It's better than AdAway.
Then You can set private dns to Your custom nextdns config.
krogoth said:
No need to use VPN Ad blockers.
Instead of dns.adguard.com use nextdns.io
Get free account and configure it as You want, with many filters full loging etc. It's better than AdAway.
Then You can set private dns to Your custom nextdns config.
Click to expand...
Click to collapse
Thanks for this tip.
I've just set it up after a week of quite successful dns.adguard.com ad blocking but I really like the enormous flexibility of nextdns.io and its (potential) threat protection, as well as the logging (in CH) and analytics. Reminds me of OpenDNS but with ad blocking as well!
I have recommended it to a friend with two younger boys, he might appreciate the content filtering side for them, but generally the one thing that has irked me about smartphones is the potential for accidentally landing on a new malware site even if it is unlikely to infect Android.
The problem with the any DNS or VPN based blocking method: Chrome will randomly stop functioning whenever I am connected to any wifi network.
It will just stop loading random sites, not show all pictures in Google Image search, not show anything anymore when you click back and forward or just stop loading anything at all.
Go to mobile connection, it immediately works. Disable the DNS/VPN blocker, it immediately works.
Reconnect wifi, it will work again for a while. Can be two days, can be ten minutes. It's completely random.
I am not able to figure out ANY reason why this is happening.
I know Chrome has its own DNS resolver and you should disable it when using DNS based blocking methods (disable async dns resolver and clear dns cache), and while this fixes the problem that not all ads are blocked in a reliable way, it doesn't fix the wifi connection loss.
Using DNS or VPN based blockers only cause problems in Chrome, no other app.
I know I could just switch browsers, its just that I use Chrome on desktop as well and like the synced bookmarks.
Does anyone have any idea why using a VPN/DNS based adblocker would cause Chrome to specifically stop working randomly only in a wifi network, but not via mobile?
I have had this issue over several devices and Android versions for years now and I can't figure it out.
fBx said:
Does anyone have any idea why using a VPN/DNS based adblocker would cause Chrome to specifically stop working randomly only in a wifi network, but not via mobile?
Click to expand...
Click to collapse
Does it happen only on your home network? If so, are you using additional adblockers such as Pi-hole or dns.adguard..com as your router's default DNS?
Interesting that it happens only with mobile Chrome. Just another reason to stop using Chrome....
just use Disconnect Pro instead, Adblock through KNOX.
Sorry guys you all lying to urselfs... best adblock is still only via root available! Energized or AdAway is where it's at.
chieco said:
Sorry guys you all lying to urselfs... best adblock is still only via root available! Energized or AdAway is where it's at.
Click to expand...
Click to collapse
Thanks captain obvious! Now go root my north american snapdragon s20...
Adguard for Android is nice, not the app store version either. It's on adguard.com
Sent from my SM-G988U using Tapatalk
[email protected] said:
just use Disconnect Pro instead, Adblock through KNOX.
Click to expand...
Click to collapse
This is a fantastic solution!
[email protected] said:
just use Disconnect Pro instead, Adblock through KNOX.
Click to expand...
Click to collapse
Thank you for this! I missed adhell so much since it worked through Knox as well. Right now I'm running private dns on my phone from adguard and I'm going to use this app along with it as well.
Just go buy a Raspberry Pi Zero W and throw an SD card into it, install Pihole on it and VPN into your home network. Most modern routers have a VPN server built into them, Samsung phones all have a VPN client built in, and you can get a Pi Zero for $10 (or under $20 bundled with an MicroSD if you don't have one lying around from an old phone).
No root or special software on the phone end needed, and once the Pi is set up it's plug and play.
---------- Post added at 05:51 PM ---------- Previous post was at 05:40 PM ----------
sublimaze said:
Does it happen only on your home network? If so, are you using additional adblockers such as Pi-hole or dns.adguard..com as your router's default DNS?
Interesting that it happens only with mobile Chrome. Just another reason to stop using Chrome....
Click to expand...
Click to collapse
Chrome is purposely crippled to do this - there's even a dev flag to disable the behavior. It's the main reason I stopped using it and disabled it entirely. I went to Samsung's browser and have actually been really happy with it - the dark mode actually makes all web sites dark, even the ones that don't work with Chrome's.
Thank you.
Do you see any issues accessing very secure sites like banks thru the DNS blocks?
sublimaze said:
Does it happen only on your home network? If so, are you using additional adblockers such as Pi-hole or dns.adguard..com as your router's default DNS?
Interesting that it happens only with mobile Chrome. Just another reason to stop using Chrome....
Click to expand...
Click to collapse
rustyram02 said:
Do you see any issues accessing very secure sites like banks thru the DNS blocks?
Click to expand...
Click to collapse
If the blocker is doing its job correctly, it shouldn't have issues with any legit site. This actually protects you since most of the blockers also block malicious domains so if you accidentally click a phishing link it *might* keep you from getting to it.
The problems you WILL see if that sponsored results in search engines will stop working, because they route through an ad site rather than directly to the thing you want to go to. Once you get used to ignoring the top few results in Google, it's not so bad. There's also the issue of sites that block you if they detect an ad blocker. Most sites aren't smart enough to be able to detect a DNS based blocker, but if they are you will either not be able to use the site, or you'll need to turn the DNS blocker off or whitelist the site while you do.
Illrigger said:
If the blocker is doing its job correctly, it shouldn't have issues with any legit site. This actually protects you since most of the blockers also block malicious domains so if you accidentally click a phishing link it *might* keep you from getting to it.
The problems you WILL see if that sponsored results in search engines will stop working, because they route through an ad site rather than directly to the thing you want to go to. Once you get used to ignoring the top few results in Google, it's not so bad. There's also the issue of sites that block you if they detect an ad blocker. Most sites aren't smart enough to be able to detect a DNS based blocker, but if they are you will either not be able to use the site, or you'll need to turn the DNS blocker off or whitelist the site while you do.
Click to expand...
Click to collapse
Yeah I stopped clicking the top search results a long time ago. I was an avid AdGuard user, but their app used too much battery. I changed my default DNS to dns.adguard.com and it blocks ads as well as their app, without the battery hit.
In 2017, I purchased two Adguard lifetime licences for $10/each ($20 total), one of my best purchased ever! Now the same license is $70/each.
Have not had a need to root and still no ads on our phones for years now!