NoRoot Firewall privacy concerns, manipulation possible? - Security Discussion

Hey folks,
I recently installed NoRoot Firewall and found it really interesting to dis/allow network traffic without root. The app uses a local VPN to tunnel traffic and selective adjust the access. It needs permission for startup and networkaccess, the dev says it only needs this for rooting issues (see in-app explanation). The funny thing is, the app runs perfectly even without the INTERNET permission.
Unfortunately, the app isn't open source, the dev is a ghost and it hasn't been audited for security flaws. Although on a German blog, a security specialist has partly audited it for 30 minutes using Wireshark and network analysis. This resulted in no unusual traffic and no manipulations (instead of Mobiwol firewall).
My concern is: Is the app able to manipulate the traffic, that's rooted through itself, to point it or copy it to another destination? I ask, because it even works without internet and wasn't manipulating traffic in the test I read. And if really sensitive data is routed through the app and it's possible to ship this data cloned to another place, it's really disturbing.
I hope someone is able to clarify the technical background.
Greetz

traceless said:
Hey folks,
I recently installed NoRoot Firewall and found it really interesting to dis/allow network traffic without root. The app uses a local VPN to tunnel traffic and selective adjust the access. It needs permission for startup and networkaccess, the dev says it only needs this for rooting issues (see in-app explanation). The funny thing is, the app runs perfectly even without the INTERNET permission.
Unfortunately, the app isn't open source, the dev is a ghost and it hasn't been audited for security flaws. Although on a German blog, a security specialist has partly audited it for 30 minutes using Wireshark and network analysis. This resulted in no unusual traffic and no manipulations (instead of Mobiwol firewall).
My concern is: Is the app able to manipulate the traffic, that's rooted through itself, to point it or copy it to another destination? I ask, because it even works without internet and wasn't manipulating traffic in the test I read. And if really sensitive data is routed through the app and it's possible to ship this data cloned to another place, it's really disturbing.
I hope someone is able to clarify the technical background.
Greetz
Click to expand...
Click to collapse
Has Droidwall been tested?

crobjam said:
Has Droidwall been tested?
Click to expand...
Click to collapse
Doesn't answer my question, but it's open source in contrast to NoRoot Firewall.

I use XPrivacy and it works OK without any additional bakdoors.
It has even more functions (blocking permissions for apps) for privacy protection.

Very good question OP.
This is a extremely useful app but I also would like to know about the possible risks involved.
One would assume that removing the internet access permission (thanks for that suggestion) would render the app harmless but I can't be sure...
EDIT: After removing the app's internet permission with APK Permission Remover I found that the app does run without any error message but it won't allow any app to connect to the internet whatsoever. Which I guess is totally logical since all connections are routed through NoRoot Firewall...

mp107 said:
I use XPrivacy and it works OK without any additional bakdoors.
It has even more functions (blocking permissions for apps) for privacy protection.
Click to expand...
Click to collapse
with the difference that you need root..
I'm looking for no root firewall, NetGuard (alpha) seems to be the alternative
http://forum.xda-developers.com/android/apps-games/app-netguard-root-firewall-t3233012

stpol77 said:
with the difference that you need root..
I'm looking for no root firewall, NetGuard (alpha) seems to be the alternative
http://forum.xda-developers.com/android/apps-games/app-netguard-root-firewall-t3233012
Click to expand...
Click to collapse
riesdepies said:
Very good question OP.
This is a extremely useful app but I also would like to know about the possible risks involved.
One would assume that removing the internet access permission (thanks for that suggestion) would render the app harmless but I can't be sure...
EDIT: After removing the app's internet permission with APK Permission Remover I found that the app does run without any error message but it won't allow any app to connect to the internet whatsoever. Which I guess is totally logical since all connections are routed through NoRoot Firewall...
Click to expand...
Click to collapse
Xprivacy cannot block Android system internet access, as that breaks your internet connection. Another limitation is that it cannot restrict android native apps. So, you need a real firewall to deal with that.
Noroot firewall is a horrible concept: your internet traffic is routed through some unknown server. Whatever you send though the internet is totally exposed to any kind of attacks/exploits. Plus, the issue of open source vs. close is totally irrelevant as applied to servers: so what if they open source their server? You will never know whether that server was built out of that open source.
The only solution is a real firewall.
Please stop listening to dopes who tell you not to root your device. They have an agenda: most of them are either advertisers, spooks or Google employees. The argument that a user doesn't know what he/she is doing and therefore should not have root is false: every known operating system on Earth (windows, mac, linux et al) provides root access/administrative rights to a user. So, how is that the same PC/MAC/Linux user all of a sudden becomes a dummy when it comes to a smart phone? The answer is he does not. But when he gets root, he can restrict advertising, spooking and spying by Google, carriers, advertisers and others.

optimumpro said:
Noroot firewall is a horrible concept: your internet traffic is routed through some unknown server. Whatever you send though the internet is totally exposed to any kind of attacks/exploits. Plus, the issue of open source vs. close is totally irrelevant as applied to servers: so what if they open source their server? You will never know whether that server was built out of that open source.
Click to expand...
Click to collapse
From what I understand, the concept of NoRoot Firewall isn't routing your traffic through an external server but using a local or virtual VPN as a firewall. The Android VPN service is only used to provide control over your connections. This was explained on their web page which now seems to have disappeared. The problem is that one shouldn't just take their word on this and that's why it is relevant that this program is not open source.
There's an interesting discussion on the subject here.

riesdepies said:
From what I understand, the concept of NoRoot Firewall isn't routing your traffic through an external server but using a local or virtual VPN as a firewall. The Android VPN service is only used to provide control over your connections. This was explained on their web page which now seems to have disappeared. The problem is that one shouldn't just take their word on this and that's why it is relevant that this program is not open source.
There's an interesting discussion on the subject here.
Click to expand...
Click to collapse
If that were so, then why would users complain that NoRoot Firewall is increasingly being blocked by various services? That surely indicates a unique IP address, which is different from your mobile/wifi IPs. Android local vpn won't create a separate external IP address. I bet if you go to what's my ip, you will find a curious IP address.
I am always amused by people saying I am looking for a no root app when it comes to security. You just can't secure a system without administrative rights. This is like saying I need protection for my car, which has a habit of swerving around, but do it without using a steering wheel.

optimumpro said:
If that were so, then why would users complain that NoRoot Firewall is increasingly being blocked by various services? That surely indicates a unique IP address, which is different from your mobile/wifi IPs. Android local vpn won't create a separate external IP address. I bet if you go to what's my ip, you will find a curious IP address.
Click to expand...
Click to collapse
I don't know where you read that 'NoRoot Firewall is increasingly being blocked by various services' but maybe it had to do with the fact that you can't use a VPN service while using NoRoot Firewall because it already uses the Android VPN functionality as a firewall.
I also verified my IP adress online and it does not change when I use NoRoot Firewall.
BTW, I am rooted because I like to have full control over my Android but I haven't come across a root firewall app with granular control like NoRoot Firewall. Do you have any suggestions?
I attached a screenshot of the app explaining itself and its permission.

stpol77 said:
with the difference that you need root..
I'm looking for no root firewall, NetGuard (alpha) seems to be the alternative
http://forum.xda-developers.com/android/apps-games/app-netguard-root-firewall-t3233012
Click to expand...
Click to collapse
NetGuard is open source and very easily audited or checked - no Internet access itself.
It isn't as granular as other firewalls, but it has no battery drain, since the VPN service is only used for sinkholing traffic. So for now it's an all or nothing way to block an individual app from network access. There's more details in the thread, and the source is quite readable too.

Its using Vpn so its a power consuming app

Can anyone suggest best root app for restricting internet traffic to apps over wifi/mobile data. And also works as a VPN. The same option is there is noroot firewall. but from somehow from the above discussion, it is not 100% secure.

optimumpro said:
Xprivacy cannot block Android system internet access, as that breaks your internet connection. Another limitation is that it cannot restrict android native apps. So, you need a real firewall to deal with that.
Noroot firewall is a horrible concept: your internet traffic is routed through some unknown server. Whatever you send though the internet is totally exposed to any kind of attacks/exploits. Plus, the issue of open source vs. close is totally irrelevant as applied to servers: so what if they open source their server? You will never know whether that server was built out of that open source.
The only solution is a real firewall.
Please stop listening to dopes who tell you not to root your device. They have an agenda: most of them are either advertisers, spooks or Google employees. The argument that a user doesn't know what he/she is doing and therefore should not have root is false: every known operating system on Earth (windows, mac, linux et al) provides root access/administrative rights to a user. So, how is that the same PC/MAC/Linux user all of a sudden becomes a dummy when it comes to a smart phone? The answer is he does not. But when he gets root, he can restrict advertising, spooking and spying by Google, carriers, advertisers and others.
Click to expand...
Click to collapse
Some of us are just stuck with phones that are locked up tight and can't root to begin with. So I to am looking for a no-root solution. Before this phone I had all the others rooted, when it was an option. I came across this in a search because I just got a gopro, and the app creates a wifi connection between the gopro and the phone. Soooo, if I'm driving with the gopro, the phone, and all other apps think it's on wifi. So while I'm controlling the camera, other apps like Pandora, Amazon Music, and the sort search and search for a connection on that wifi network that's only between phone and camera, and won't resort to mobile data as long as that connection exists. Anyway, calm down.... not everyone has an agenda. Rooting is indeed relatively simple, but it's also equally simple for someone who missed one detail to ruin their phone. Anyone that ever asked me about it, I'd help them and give them a good "what you need to know" before I show them how to make sure they understand how important it is to read read read. If I get the impression they're a little impatient, or this kind of thing goes over their head, I discourage them from rooting. Just because I care and would hate for them to ruin an expensive device.

Hey folks,
I recently signed up in this forum, and I'm aware of it's professionalism. First, I was a simple observer because I wanted to try to understand the basics and it wasn't not a long time I discovered Android.
I installed NoRoot Firewall. My smartphone is rooted and I also installed LightningWall.
I blocked (with LightningWall) outgoing and inbound access concerning "NoRoot Firewall", and NoRoot Firewall is running fine.
Is it the good action to be sure that NoRoot Firewall doesn't export my data to an external server ?
Or it's not the good action because NoRoot Firewall uses a VPN ?
Sorry if my first post is too basic.
I hope someone is able to answer me.

Due to my recent installation of app Network Log, I have examined the I/O on the Net made by NoRoot FireWall.
It appears (by examining the log) that NoRoot FireWall is making I/O on the Net, but unfortunately I can't determine if those I/O are on behalf of applications crossing NoRoot FireWall (through Android VPN functionality), or for app NoRoot FireWall itself.
I don't know how to determine it.
If anybody has an idea.

iwanttoknow said:
Due to my recent installation of app Network Log, I have examined the I/O on the Net made by NoRoot FireWall.
It appears (by examining the log) that NoRoot FireWall is making I/O on the Net, but unfortunately I can't determine if those I/O are on behalf of applications crossing NoRoot FireWall (through Android VPN functionality), or for app NoRoot FireWall itself.
I don't know how to determine it.
If anybody has an idea.
Click to expand...
Click to collapse
guys,
maybe we could just block the noroot firewall app itself in the app list from using data/wifi.
it's running fine for me.

micmaccc said:
guys,
maybe we could just block the noroot firewall app itself in the app list from using data/wifi.
it's running fine for me.
Click to expand...
Click to collapse
Hi,
I blocked output of Noroot Firewall in the list of its controlled app.
I also blocked Noroot Firewall with LightningWall (input and output).
And I observed I/O made by Noroot Firewall in Internet, by using app NetworkLog (examining its log file).
I can't determine if I/O made by Noroot Firewall are really made by Noroot Firewall by itself, or for allowed app crossing Android VPN used by Noroot Firewall.
Is there a tool to determine it ?
Amusons-nous avant tout !

Hello. Please excuse the necro.
A few questions please:
I'm not a networking expert. I do not understand the difference between the pre- and post- filters. Does it need to be redundant, ie mirror the rules on both filters?
How do you know if it's incoming or outgoing?
Also, why is it that even if there is a rule blocking a domain, such as *.domain.comort, I still see a connection being requested?
micmaccc said:
guys,
maybe we could just block the noroot firewall app itself in the app list from using data/wifi.
it's running fine for me.
Click to expand...
Click to collapse
How do you do this? I always thought blocking NoRoot from within NoRoot didn't make sense. Do I need to install another FW?

fpjones3 said:
Hello. Please excuse the necro.
A few questions please:
I'm not a networking expert. I do not understand the difference between the pre- and post- filters. Does it need to be redundant, ie mirror the rules on both filters?
How do you know if it's incoming or outgoing?
Also, why is it that even if there is a rule blocking a domain, such as *.domain.comort, I still see a connection being requested?
How do you do this? I always thought blocking NoRoot from within NoRoot didn't make sense. Do I need to install another FW?
Click to expand...
Click to collapse
Install another FW dosen't make sense, because all traffic through NoRoot. The another FW can't recognize the network access by apps.
---------- Post added at 07:14 AM ---------- Previous post was at 06:58 AM ----------
iwanttoknow said:
Hey folks,
I recently signed up in this forum, and I'm aware of it's professionalism. First, I was a simple observer because I wanted to try to understand the basics and it wasn't not a long time I discovered Android.
I installed NoRoot Firewall. My smartphone is rooted and I also installed LightningWall.
I blocked (with LightningWall) outgoing and inbound access concerning "NoRoot Firewall", and NoRoot Firewall is running fine.
Is it the good action to be sure that NoRoot Firewall doesn't export my data to an external server ?
Or it's not the good action because NoRoot Firewall uses a VPN ?
Sorry if my first post is too basic.
I hope someone is able to answer me.
Click to expand...
Click to collapse
You can think of it as a router on the network.

Related

Real Android firewall - doable? Does it exist?

DroidWall in the marketplace allows full WiFi access to all apps.
Is it possible to code an application for Android (perhaps with root access) that can:
- deny all outbound data access per app basis
- specify the rules (ip-range/port-range) per app basis
Like a real alternative to a desktop software firewall?
Way too many apps are leaking all sorts of information (in plain text!) from the user account database to the Internet.
The android security makes me really scared to use the platform for anything requiring security. The privacy/security model is basically a swiss cheese that can be poked through by almost any app that just asks for certain rights at install time.
I'm hoping a firewall would be able to limit this issue, no?
I don't know about the other stuff you mentioned, but my version of DroidWall has a block/allow option for wifi and 3g, separately. It's the latest version from the market place, 1.4.2
Thanks, I just checked it out and it seems DroidWall indeed has a Wifi side blocking by app basis as well. I'm still testing though.
Ah, just tried it. Force closes on Galaxy S (rooted). Sigh.

[APP][ROOT] LBE Privacy Guard - Most Powerful privacy protection app for Android

LBE Privacy Guard v2 is available, check http://forum.xda-developers.com/showthread.php?p=18948472#post18948472 for more information.
----------
First, my apologize for poor engish
Please allow me to introduce LBE Privacy Guard, a small app wrote by myself. This app enhances Android permission system and protects your privacy.
LBE Privacy Guard works just like Windows UAC, it intercept vital actions (like send SMS, call phones) and requests to access sensitive data(SMS conversation, contacts, phone location, IMEI, IMSI, etc) from apps, then prompt for your confirmation. Unless explicit permit, such actions and request will be rejected.
LBE Privacy Guard also has a low-level firewall, supports per-app control like droidwall, but not require netfilter/iptables so it works on pre-froyo devices and faster than droidwall because it doesn't filter packets.
So why I wrote this app? Because android permission system sucks, it's very hard for average user to understand the meaning of each permission, there is also no way to track the behavior of installed app and no way to control the permission of installed app(except uninstallation).
I hope my app could bring dynamic permission control and real-time track for installed apps. So you can figure out which app is stealing your privacy and block it before your privacy stolen.
Requirements
**NEEDS ROOT**
Works on Android 2.0 and above.
Tested on various devices and firmwares, but not tested on Android 3.0 and 3.1 devices.
Current Features
1. Block unwanted send SMS / call phone operation
2. Block unwanted access to phone location, contacts, SMS/MMS conversation database, IMEI/IMSI/ICCID/phone number.
3. Integrated low-level firewall, no netfilter/iptables required, works on pre-froyo devices
Market Link
https://market.android.com/details?id=com.lbe.security
Contact us
For any questions, feel free to send mail to [email protected], any comments are welcomed.
You can also check our website at http://www.lbesec.com (Chinese only)
Screenshots
Good application, Thank you
im gonna give this a look. will report back if any issues
Been waiting for an app that watches local permissions.
Can you tell me what exactly is "low-level firewall." How can it filter network traffic if it does not make use of iptables?
Looks promising. Will give it a test ride for a few days.
Sent from my Legend using XDA App
good app
Sent from my Desire HD using XDA App
crashed after a reboot. will re-install and do another test run later as it would not start the security service when i rebooted my phone.
This is great app... works very well on 2.3.4. Thanks for this wonderful app...
from my desire using xda
traumatism said:
crashed after a reboot. will re-install and do another test run later as it would not start the security service when i rebooted my phone.
Click to expand...
Click to collapse
hi traumatism, i would appreciate if you could tell me your phone model, and the ROM you are using.
It looks like LBE Privacy Guard has some problems to obtain ROOT privilege during auto start process.
Installing now, this looks interesting. I'll report any issues tomorrow.
Thank you.
edit: absolutely no issues, this app is awesome!
I was looking for something like this for the longest time... especially since my kernel doesn't support iptables. Installing now.
I am gob smacked, this application is brilliant!
Had it installed for around 2 hours now, no issues at all, works perfectly fine after reboot, doesn't appear to slow down phone or have any performance impact.
This should be included in Android by default!
Running it on HTC Inspire 4G with CM7.0.3
Great app. my first impression is good. looks like you've did a good job .. Thx happy
First look is great. Thank you. It is exactly what I am looking for
asicman said:
Been waiting for an app that watches local permissions.
Can you tell me what exactly is "low-level firewall." How can it filter network traffic if it does not make use of iptables?
Click to expand...
Click to collapse
The "low-level firewall" does not filter packets, instead it removes network related supplemental groups of certain process. Without such supplemental groups, socket syscall will fail with EPERM, so the application will not be able to access network.
This solution neither require netfilter kernel module / iptables binaries, nor filter packets, it's faster. but it can't distinguish 3G and WIFI connections.
I love this idea! I haven't updated "att Mark the Spot" in months because they requested access to everything. The first thing was trust my root apps, sms, gmail & voice apps, then I blocked my phone ID from ALL apps. (would've been nice to have a "reject all" option there.) My question is, are there any legitimate reasons for an app to request my IMEI? Are there any potential negatives to blocking my IMEI from ALL apps?
Edit: I also experienced the force close on reboot, but LBE started right back up on its own. Atrix 4.1.83
eoc, are you planning to release the source code?
Hi guys,
I am a little confused by this app. Can it allow me to stop the imei sending to my carrier when I connect to the network? They are trying to reduce the amount of data included in my plan if im not using an phone!
n3man said:
Hi guys,
I am a little confused by this app. Can it allow me to stop the imei sending to my carrier when I connect to the network? They are trying to reduce the amount of data included in my plan if im not using an phone!
Click to expand...
Click to collapse
No., It will only block apps and not the communication between your device and the carrier which is impossible on GSM networks.
Is anybody experiencing problems with blocked apps? Like fc or anything similar.
Sent from my LeeDroid Desire HD using laggy Tapatalk

[Q] Privacy solution with on demand internet and autostart blocking?

I have been using CM11s own Privacy Guard for quite some time to block access to personal data, but I'm growing increasingly unhappy with it, as it doesn't contain anything to block internet or prevent autostarts specifically for an app. It also doesn't look like this is being worked on. So, I tried XPrivacy, but this doesn't block internet reliably (as the author himself told me) and preventing autostarts is beyond the scope of it. So, still unhappy.
I know about solutions like AFWall+ (for blocking internet access) and Rom Toolbox Pro for disabling autostart listeners, but that's not what I'm searching for. I'm searching for something that gives me a prompt, asking for permission, right when an app tries to access the internet or tries to autostart - the same way as Privacy Guard and XPrivacy do for the stuff they are made for. Additionally, preventing access to the unique ID (ie. giving false data) would be a plus, as I'd like to achieve complete privacy with as few different apps as possible.
Any ideas?
Oh well... this got moved to General discussion, although it is Android specific. Anyone got any recommendations?

Can I make an app think I'm using a japan vpn without actually using it?

Hi, I'm a Samsung galaxy note 3 user, android version 4.4.2, I have it rooted, and xposed installed. I never installed xposed before but I installed it a couple of days ago and now I'm seeing that I can do a lot of things with it, and because of this I started wondering something.
Well, I have an app called Abematv which is a free japanese tv app that I can't use unless I connect through a japanese vpn. I do this by using an app called "japan vpn" and "openvpn connect for android". The problem with this is that sometimes is too slow and the video quality is very low. So I was wondering how could I make this app think I'm using a japanese vpn when I'm really connected to my home wifi without any vpn.
I don't know if this can be done but it sounds like it's the kind of thing that you do through a xposed module. If there's a module that can do this, I don't know how to search for it. So if anyone knows how to do this via xposed or via whatever it makes it possible, please leave a comment
Thanks
azigta said:
Hi, I'm a Samsung galaxy note 3 user, android version 4.4.2, I have it rooted, and xposed installed. I never installed xposed before but I installed it a couple of days ago and now I'm seeing that I can do a lot of things with it, and because of this I started wondering something.
Well, I have an app called Abematv which is a free japanese tv app that I can't use unless I connect through a japanese vpn. I do this by using an app called "japan vpn" and "openvpn connect for android". The problem with this is that sometimes is too slow and the video quality is very low. So I was wondering how could I make this app think I'm using a japanese vpn when I'm really connected to my home wifi without any vpn.
I don't know if this can be done but it sounds like it's the kind of thing that you do through a xposed module. If there's a module that can do this, I don't know how to search for it. So if anyone knows how to do this via xposed or via whatever it makes it possible, please leave a comment
Thanks
Click to expand...
Click to collapse
Ok well first things first. Don't mention lucky patcher here. It is banned as a Warez app and app developers will add code to that purposely causes issues if it is detected.
Depending in how it is getting your location you could make the device think it is in Japan. Something like mocking the Gps.
zelendel said:
Ok well first things first. Don't mention lucky patcher here. It is banned as a Warez app and app developers will add code to that purposely causes issues if it is detected.
Depending in how it is getting your location you could make the device think it is in Japan. Something like mocking the Gps.
Click to expand...
Click to collapse
Hi, I eddited the message so the words don't appear. (would be good if you edit your message so the words don't appear there too, I don't want troubles xD) Thanks.
About the gps thing, I think it doesn't use the gps since I have it disabled and the app doesn't have the permission to get the location, so I think it gets the location based on the ip.
Not all VPN services are the same. Your current VPN service may be slow because it has you connecting through Japan. Nice VPN services allow you to connect to a VPN server in your country while they route your country VPN server to the final destination VPN server. This allows you to sometimes benefit with improved connection speeds. You can do free trials with most VPN services and I recommend maybe moving to another.
Example: Normal VPN> your-device->VPN server in japan->your-device
(upload/download limits determined by home network and ISP max connections)
Higher end VPN> your-device->local VPN->VPN server in japan->local VPN->your-device
(upload/download limit between VPNs determined by VPN servers which maximize limits before passing the information to your local device)
Other info relevant to the topic:
There are many options available to a developer to verify your location in today's internet.
Even your browser for your device has a unique "fingerprint" and if your gps or IP location changes they can still verify it's coming from the same device.
There are ways around browser fingerprinting.
With most programs, there is an order or hierarchy of testing your location. Spoofing your GPS may overrule an IP check. To overcome issues it's important to try and test and try even when met with failures. It's important to not be dismissive of possible solutions when troubleshooting an issue or searching for a work-around.
TehZig said:
Not all VPN services are the same. Your current VPN service may be slow because it has you connecting through Japan. Nice VPN services allow you to connect to a VPN server in your country while they route your country VPN server to the final destination VPN server. This allows you to sometimes benefit with improved connection speeds. You can do free trials with most VPN services and I recommend maybe moving to another.
Example: Normal VPN> your-device->VPN server in japan->your-device
(upload/download limits determined by home network and ISP max connections)
Higher end VPN> your-device->local VPN->VPN server in japan->local VPN->your-device
(upload/download limit between VPNs determined by VPN servers which maximize limits before passing the information to your local device)
Other info relevant to the topic:
There are many options available to a developer to verify your location in today's internet.
Even your browser for your device has a unique "fingerprint" and if your gps or IP location changes they can still verify it's coming from the same device.
There are ways around browser fingerprinting.
With most programs, there is an order or hierarchy of testing your location. Spoofing your GPS may overrule an IP check. To overcome issues it's important to try and test and try even when met with failures. It's important to not be dismissive of possible solutions when troubleshooting an issue or searching for a work-around.
Click to expand...
Click to collapse
ok thanks, I will try to spoof the gps and will comment how it worked .

Help security/privacy question GrapheneOS (noob, beginner)

Hello everybody, i am using Graphene OS and only FOSS apps and i have a question. Recently i see some Foss apps also have "trackers" like Duckduckgo browser for example. I want to choose which apps i can block the internet connection for + the communication wich each other + VPN. I tried to use a "firewall" like netguard to block internet connection from the apps whoem don't need it + trackercontrol to block the trackers from all the apps and OpenVPN to hide my IP adress. But i can't use these 3 apps at once because the phone recognize them all as an VPN. Does anyone have the solution for this for me?
Use Brave browser.
jwoegerbauer said:
Use Brave browser.
Click to expand...
Click to collapse
That is only for tracking on web browsing. I am searching to block unwanted trackers on the background from the apps also
When you are on the Internet, data such as IIP address, browser type, operating system, etc.pp, are inevitably transported with. Even a VPN service - what is superior to a Proxy - get this data transmitted. And you never will really know what the VPN service is doing with these data - at least VPN services that are free-of-charge - and whether they themselves run Man in the Middle Attacks or not.
BTW: A Firewall protects a network’s resources from intrusion by users on another network such as the Internet. All networked and online Android users should implement a Firewall solution, IMO. If you have a rooted Android smartphone, you can use AFWall+ to control your device’s Internet activities. AFWall+ also allows users to control Internet access on a per-app basis.
jwoegerbauer said:
When you are on the Internet, data such as IIP address, browser type, operating system, etc.pp, are inevitably transported with. Even a VPN service - what is superior to a Proxy - get this data transmitted. And you never will really know what the VPN service is doing with these data - at least VPN services that are free-of-charge - and whether they themselves run Man in the Middle Attacks or not.
BTW: A Firewall protects a network’s resources from intrusion by users on another network such as the Internet. All networked and online Android users should implement a Firewall solution, IMO. If you have a rooted Android smartphone, you can use AFWall+ to control your device’s Internet activities. AFWall+ also allows users to control Internet access on a per-app basis.
Click to expand...
Click to collapse
Thabk you very much for youre great advice. So if i understand it good it is VPN connection is not a top priority right? Is it also true that GrapheneOs creates every day another imei number? Is the firewall solution of AFWall+ not the same as Netguard? If no can you please tell me what the difference is. AFWall+ gives in Fdroid that it has antifunctions, also for a lot of other apps. Does that have also influence on privacy and security?
I don't
1. make use of VPNs
2. know anything about GraphenOS. Changing IMEI and/or Wi-Fi Mac Address on a per daily basis makes no sense for me
3. use NetGuard, never tried it

Categories

Resources