So I've reinstalled a pretty minimal Lollipop rom recently, didn't install any of the Google things and use F-droid exclusively.
From Network Log:
https://f-droid.org/repository/browse/?fdfilter=Network+Log&fdid=com.googlecode.networklog
I can tell what all the connections from my phone are doing and they're indeed what I wanted, except for a bunch of HTTP connections which show up randomly whenever I do anything that is network related, and they seem to be retrying in the background. Network Log shows these are from the process (1000) PPPreferences, to 54.xx.xx.xx:80. From Whois these IPs are owned by AWS and by connecting there directly it show it's their cloud front (e.g. http://54.192.137.127/). Occasionally it would also try to connect to an IP owned by Google (216.58.221.142:80) and an IP owned by my Carrier. These connections would show up if I'm using anything but the "System built-in" logging method. Does anyone have any idea what process or service is making these connections?
Obviously it's not PPPreferences, since I've downloaded the apk for the version for my OPO, decompiled it. It has nothing to do with network and it's definitely not making any connection. So I suppose it is being mixed up with other processes, in AF+ firewall, the following processes got mixed up into the same group:
PPPreferences,
Android System,
DeviceHandler,
Settings Storage,
QuickBoot,
Input Devices,
Phone,
Key Chain,
Settings,
LocationServices,
Fused Location,
com.qualcomm.timeservice
It's not a huge problem because from the connection log, the firewall is stopping these connections properly, but I wonder what it is. If it is related to Google provided services, why would it still creep in when I've gone through all the length of installing a rom without Google Play and Gapp, that's worse than Microsoft or the former Doubleclick in their worst days.
Related
I have recently purchased an LG Vortex that comes with the Android 2.2 operating system installed. I have looked into rooting my phone with z4root and have successfully temporarily rooted my phone. I would rather keep my phone unrooted, but if it is absolutely necessary I will root it permanently with z4root.
My question is this: How can I connect to my company wifi and use apps that require wifi?
I can successfully connect to my corporate wifi through the 802.1x EAP protocol. The problem comes when trying to access any of the apps that require internet (I am forcing Verizon's data plan not to be used--using wifi only due to 150MB limit on my data to save $$ per month). None of my apps seem to work--internet browser, Market, Gmail, Google Calendar, etc...
On my company pc I know that within internet explorer the box is checked that says "Use automatic configuration script" and gives an "Address" that is in the format of "..../proxy.pac" It looks like my work uses a proxy for things to connect to the internet. I have no such place to put this information in my LG Vortex. I downloaded an app that seemed promising called "Proxy Settings" which will allow me to enter in the following Hostname and Port. When I tried to enter the "..../proxy.pac" as the hostname it gave me an error stating "The hostname you typed is not valid."
Is there an app or something that will allow me to use my apps when connecting to my corporate wifi? Is it a proxy setting thing or a VPN thing? I am not sure. I am open to any and every idea so that I can use my phone's online features while connected to my company's wifi.
FYI - I have friends that have iPod touches and they are able to connect to the internet with some apps internet browsing and downloading apps, but they have a similar issue of not being able to use all of their apps as well. I believe they were able to put the "..../proxy.pac" address in their devices somewhere.
Thanks!
Any ideas? HELP!!!
Your compay could have blocked its use on WIFI?
i think the Corp have blocked the connection. Basically blacklist everything but certain site. Try to access facebook through the browser, if it goes through then i dont know. Of not then the Corp have things blocked.
IP Table based Android firewall apps (i.e., DroidWall, LBE Privacy Guard) are known to provide a good measure for preventing applications accessing the internet. However, during the boot time, while they are not fully loaded in the background yet the phone might still be vulnerable.
It might have not occurred but there is actually a very simple solution to the above problem. Disabling the Data service before restarting the phone will leave no chance an application can get a chance to transmit data on the startup process. The option to disable/enable data is normally found under the Data Delivery from the Settings menu.
Also on my Motorola Atrix I found when data is disabled the phone starts a bit quicker for obvious reasons -- any apps that allowed to access the internet does not perform its tasks i.e. weather widgets.
I'm sorry if this tip was already a widely known knowledge. Hope it helps someone new in Android world.
Here's what's happening, only since I've been trying to flash a custom ROM....never had this problem with this site before.
When connected to hostpot:
I go to a certain website, and it just saying "waiting for www....." it doesn't matter what browser I use.
When connected to other wifi hotposts like optimumwifi:
I go to the same website and it loads without any issues.
When I use my phones browser:
I go to the same website and it loads without any issues.
Someone please help, this is super annoying. Also, I should note that 99.999% of website are loading without issue.
My best guess is that HotSpot maybr blocking some sites, ut happens. I always use custom forced dns address. I prefer opendns
208.67.222.222 second can be blank or use Google 8.8.8.8.
There are free dns apps, or you can set advanced ip (static) under that wifi, but note that HotSpot ip usually changes.
when I connect to a captive wifi, I want to use the connection as is (maybe I want to login without telling google - since the builtin authenticator uses their gstatic domain, or maybe I want to probe the network as it is being redirected, or maybe I just want firefox to manage my password to the portal, etc)
but after I select "use wifi as is" on the android webview builtin auth screen, android starts to route all and every traffic to my 3g/4g data connection instead, until I disable and re-enable wifi.
it will only ever redirect traffic to wifi after it successfully got the correct 204 from gstatic.com
is there anyway to work around this?
I am on android6, but I think I has always been like that.
gcbxda said:
when I connect to a captive wifi, I want to use the connection as is (maybe I want to login without telling google - since the builtin authenticator uses their gstatic domain, or maybe I want to probe the network as it is being redirected, or maybe I just want firefox to manage my password to the portal, etc)
but after I select "use wifi as is" on the android webview builtin auth screen, android starts to route all and every traffic to my 3g/4g data connection instead, until I disable and re-enable wifi.
it will only ever redirect traffic to wifi after it successfully got the correct 204 from gstatic.com
is there anyway to work around this?
I am on android6, but I think I has always been like that.
Click to expand...
Click to collapse
Do you have any kind of Linux ide? Have you tried making a tunnel?
Or is that what your looking for. I'm not 100% sure what your looking for. If your trying to skip Hotspot authentication? Or anything like that Then a tunnel would work fine.
Sorry I can't be of much else help
If your phone is rooted or has a custom ROM (Which would obviously indicate that the phone is rooted), there is a solution that you can try using a terminal (Or ADB shell).
Issue the command: "settings put global captive_portal_detection_enabled 0" That should prevent captive portal detection and gstatic confirmation. This should work, I haven't tried it personally though.
Additionally, you can setup a captive server.
Issue the command: "settings put global captive_portal_server g.cn"
Restart your phone, and you should have access to the pages.
Basically, connecting as is, requires you to reach a site that does not require 204 confirmation and afterward other sites should be accessible. Let me know if this helps.
Josh Ross said:
If your phone is rooted or has a custom ROM (Which would obviously indicate that the phone is rooted), there is a solution that you can try using a terminal (Or ADB shell).
Issue the command: "settings put global captive_portal_detection_enabled 0" That should prevent captive portal detection and gstatic confirmation. This should work, I haven't tried it personally though.
Additionally, you can setup a captive server.
Issue the command: "settings put global captive_portal_server g.cn"
Restart your phone, and you should have access to the pages.
Basically, connecting as is, requires you to reach a site that does not require 204 confirmation and afterward other sites should be accessible. Let me know if this helps.
Click to expand...
Click to collapse
no root on the phone (damn blackberry priv) and no control of the portal.
this is so infuriating. This is trivial, banal even, on any device i control. Feel like a kid on training wheels every time i touch my phone.
Privacy: Does Android upload your home AP SSID/BSSID/GPS if the home AP beacon is "hidden?"
Does hiding your home AP broadcast beacon prevent UPLOAD of your SSID/BSSID/GPS to Google?
If so, how?
Background:
Anyone navigating on Android who drives by my home after they pressed OK to the Google Maps query is likely automatically uploading to Google my private information without my consent.
To continue, turn on device location, which uses Google's location service. [No Thanks or OK]
By default, this simple act turns the Android phone that drives by my home into a spying device for Google:
Android11-Settings > Location > Location services > Google Location Accuracy = ON
Google's location service improves location accuracy by using Wi-Fi, mobile networks, and sensors to help estimate your location. Google may collect location data periodicaly and use this data in an anonymous way to improve location accuracy and location-based services. Turning this off will result in your device only using GPS for location. This may impact the accuracy of location used by apps such as Maps and Find My Device.
All I'm asking with this question is whether turning off the home access point broadcast beacon (aka hiding the SSID) prevents those phones from UPLOADING my information to Google servers (and to other servers) by default.
Please be advised this question has nothing to do with using "_nomap" as part of the SSID. The question is independent of whether _nomap is used because the upload to Google by phones driving by your home of your SSDI/BSSID/GPS still occurs with or without _nomap on a broadcast SSID.
I'm interested in this as well. I've lowered the signal strength so you can't connect to it from the street, hidden SSID, but I'm pretty sure that [Forgot to not be evil] Google will collect all and any data it can get hold on. For example, if using an app to check signal strength, it recognizes the WIFI signal, so I'm guessing it's getting picked up by G as well. It's only a guess... and a history knowledge from them getting high on personal data
Марија said:
Notice that this is BENotice that this is BEI'm interested in this as well.
Click to expand...
Click to collapse
Thank you for letting me know the solution will also be useful to you as that's why I asked it.
We want a definitive solution for people like you and me (we can't be the only ones who care about our home AP privacy).
I think anyone who is concerned about their home privacy wouldn't want their SSID/BSSID/GPS in a public database if they didn't expressly opt IN on purpose.
The default assumption by Google (and many others) is, I suspect, that if you publicly broadcast your SSID in the clear, then you're opting in.
Even though I disagree with this default assumption I have to understand the logic which is why I don't broadcast my SSID.
By not broadcasting my SSID I'm (hoping) it's signaling my intent to opt OUT.
Марија said:
I've lowered the signal strength so you can't connect to it from the street, hidden SSID, but I'm pretty sure that [Forgot to not be evil] Google will collect all and any data it can get hold on.
Click to expand...
Click to collapse
I thank you for that idea of lowing the signal strength (which only some routers will allow, I think) but I need all the signal strength I can get.
And more to the point most people need all the signal strength they can get, I think.
Even so, while lowing the signal strength may help, it still won't work for the Android devices that walk close enough to your front door to access your signal after using Google Maps.
Pragmatically, all it takes is the postman or the Fedex guy or the UPS guy to have his Android phone on with his "Google Location Accuracy" turned on.
It's even worse if they have "Improve accuracy" turned on, as that adds additional "Wi-Fi scanning" and "Bluetooth scanning", which is another can of worms we'll stay out of for this thread.
Speaking of Google Maps, you can "fix" the problem of Google Maps secretly turning on "Google Location Accuracy" but you have to go into your Android settings to find the special Google Maps (Google Play Services actually) "activity" named
com.google.android.location.settings.GoogleLocationSettingsActivity
Actually the activity Google Maps used is a secret undisclosed activity one step BELOW that com.google.android.location.settings.GoogleLocationSettingsActivity activity since the "OK" in Google Maps automatically secretly toggled it on.
Nonetheless, I set a shortcut to the com.google.android.location.settings.GoogleLocationSettingsActivity which allows me to turn the "Google Location Accuracy" toggle off (while leaving the "Location" toggle on) after I say "OK" to the Google Maps query to turn on location.
BTW, the undisclosed hidden secret activity is a specific Google activity that only Google does, as far as I know.
No other program that I know of secretly toggles "Google Location Accuracy" on other than Google Maps which is one reason Google is being sued in Arizona as we type for their secret tricks to get our private data uploaded to their public servers.
Марија said:
For example, if using an app to check signal strength, it recognizes the WIFI signal, so I'm guessing it's getting picked up by G as well.
Click to expand...
Click to collapse
Here is where our little secret lies!
I have absolutely no doubt that the phone's radio picks up the hidden BSSID (because I can see the hidden BSSIDs on my phone when I use any decent Wi-Fi graphing app).
However........
It's my understanding (which I need to find a reliable source to back it up) that someone's phone that is typically set to upload the SSID/BSSID/GPS by default will NOT upload that BSSID if it's hidden.
What's important is that sentence assumes that the typical upload of the SSID/BSSID/GPS requires the SSID to be broadcast in the clear.
If that's true, then simply HIDING the SSID broadcast beacon will stop other phones from uploading your SSID/BSSID/GPS to not only Google servers, but potentially Mozilla, Kismet, Wigle, Netstumbler, and other servers.
Note that I'm not saying it can't be done by a determined program. What I'm saying is that it's my understanding that it isn't done.
Notice the profound implications?
If I'm correct, then HIDING THE SSID broadcast is far BETTER than using _nomap (although I'd still use nomap also) simply because hiding the beacon broadcast is making it clear your intent to even those public databases that do not respect the nomap.
I think this is the way the Android SSID/BSSID/GPS upload typically works.
Of course ... there's more to the story...
One problem with hiding your SSID is that it kicks the privacy can down the road because now your phone is constantly asking by name for that SSID when you're not connected and your Wi-Fi is on.
Of course, there's a simple fix for that secondary problem (which works in Android 11 at least), which is to set your Wi-Fi on your phone to stop asking for your hidden SSID when you're out of range of it.
That don't-ask-by-name-for-my-hidden SSID setting on Android 11 is
Settings > Connections > Wi-Fi > (select an SSID) > gearicon > Auto reconnect = OFF
Марија said:
It's only a guess... and a history knowledge from them getting high on personal data
Click to expand...
Click to collapse
I would like to find a reliable source that backs up that guess that Google and Mozilla and the others (Kismet, Netstumbler, Wigle, etc) "don't" get your SSID uploaded to their servers by default if your home AP SSID beacon broadcast is hidden.
Notice I said "don't" which I think may be the case only in the default situation, as I'm well aware any determined person "can" upload even your hidden home AP BSSID/GPS information manually to any public server they want to.
In the end, I have a solution that I'm constantly honing to improve it where I want to accomplish two things here.
I want others to be able to do what I can do, and
I want others who know more than I do add to what we can all do in terms of keeping our SSID/BSSID/GPS out of Google's hands (and that of Kismet and the rest).
To clarify things: Android OS is developed by a consortium of developers known as the Open Handset Alliance and commercially sponsored by Google. It is free and open-souce software. It's source code is known as AOSP.
Android OS isn't collecting data as Google Mobile Services ( GMS ) do.
If you do not need any GMS applications or services, a high-quality AOSP ( like LineageOS what is just a modded version of AOSP ) protects your privacy at 100%, IMO.
jwoegerbauer said:
If you do not need any GMS applications or services, a high-quality AOSP ( like LineageOS what is just a modded version of AOSP ) protects your privacy at 100%, IMO.
Click to expand...
Click to collapse
I agree with you that I should switch to aosp given that I have no need for gms services.
But the phone is still technically owned by T-Mobile for two years (it was free) so I am under the impressions (see below links) that I can't add aosp yet (is that true?).
Question Does anyone know how to root the Samsung Galaxy A32 5G?
Question Any chance that a Samsung Galaxy A32 5G can get aosp?