I wanted to know if there is a way to set from what area your IP shows up as when you connect to the internet on your Android phone?
For instance, I have a T-mobile G2 and when I connect speedtest.net or an IP finding website, it shows the location of my IP address. Usually its close, sometimes its far away.
Is there any way to choose a static IP or range of IP's to narrow down where my IP is located? i.e. can I choose to spoof my IP to show me in another state? I'm rooted running CM6.1 so I'm down for things that need root access.
Thanks in advance for info/help. I'm gonna continue to research this as well.
Its going to show the location where the IP should be.
maxmind.com is a good lookup to see where the IP should be coming from. (background- they are designed for charging websites, your IP says you are in Nigeria, or Flordia, or wherever, but you are having your order shipped to Washington, so we need to check for fraud more carefully, or hulu and not allowing to be viewed outside US - but same applies to any country)
Especially on celluar, its going to depend on the cell network, your phone likely is behind their NAT. If the NAT is in the same city you are, its going to be really close.
Example Rogers in Canada has 2 cities as far as I can tell with equipment in Montreal and Toronto (when I was getting external DHCP addresses it was one of these 2 cities) Now that I have a static external address, I allways show as Montreal even when I'm on the West-Coast. When using the NATted addresses (10.x.x.x) it would allways show as Toronto (or Greater Toronto area) might have been Markham.
To spoof your IP to show you're in another state, I believe Giganews offers a VPN that will be comptable with just about everything, west coast US, east coast US, one in Asia and one in Europe.
This is going off memory, if I'm found incorrect, I'll edit the post.
Kevin
Thanks for the information. Makes a lot of sense. Now I just gotta figure out the proper way to set up the VPN on my phone. I've got to the VPN settings, I've just gotta figure out the proper setup
So basically the VPN settings on Android can accept any VPN address/info that I am signed up for? I don't really know if I wanna pay for a VPN and I know there are free alternatives, especially considering that I dont need any more services than what a free one offers.
Any and all of the free ones I've seen, are designed for computers, PC or Mac, they require software installed.
The reason I mentioned the Giganews VPN service, was because it is the PPTP standard vpn connection, so supported without a software application.
I am interested if you know of free ones that offer this.
Additionally, you also have to check to see if your provider blocks VPN connections on your phone. Rogers does unless you pay extra for a non-NATted IP. So its a trial and error. I know a few providers in the US have a VPN APN, which is designed for people using VPN services. I don't know which block VPN connections by default.
It should be compatible with PPTP and IPSEC VPN services.
Ok so I figured I would post my question here as this thread is already created and has keywords that pertain to my question/problem
Now I provide support for several end users and I need VPN access to their network/machine at a glance for the type of support I provide. I was thinking of something along the lines of something software based that would allow me to access their network (shared files mostly) but I cant think of anything that I can setup one time and not have to worry when they take the laptop/desktop home and their IP address changes or if their firewall is not properly configured.
Any solutions to this particular problem?
I was thinking of something Hamachi like but I do not need remote access I just need file sharing access and network access...
I know that Windows 7 and Server 2008r2 have a dial-less VPN that can be setup, the computer will connect to your VPN service, anytime it is on, and you would be able to share the files that way.
Or users dial the VPN whenever they log in, but that would stop you from connecting remotely after a reboot.
Ideally, they should be connecting to your server, and saving all their files there?
Not enough infomation to actually give you any other ideas, can PM me with what hardware and software you have to work with, mobile devices or not, ect.
I don't have much time to look into it at the moment, but for those of you who tether either internet or bluetooth you should look into getting NAT going on your phone. This requires root as far as I know.
You can use iptables (comes with our kernels), ipchains, netfilter, or what ever else passes for NAT/firewall these days on linux. I'll probably end up compiling a ipchains binary here in the next couple weeks if I don't find one (I haven't been able to as of yet)
That will solve the problem of detection via originating address.
To bypass deep packet inspection, look into an encrypted VPN solution. There are some free ones out there, or you can try something like what Giganews offers. Depending on how AT&T does things, this could also potentially speed up your service because many ISPs give VPNs higher QOS priority. This could also be a bad thing because they could decide you need to be on the enterprise plan. Use at your own risk. If you really want to get crazy, tunnel a VPN through an SSL proxy.
One other thing that will help that will help in general is to install any firewall program. Here are a couple I found on the market (sorry can't link yet):
com.wemobs.internetfirewall
com.mm.plugins.contactsprotect.droidwall1
com.dexters.andfirewall
com.googlecode.droidwall.free
I have not tested any, but they all appear to allow you to pick and choose which applications can access the internet. What better way to make sure no applications are phoning home without permission.
These may or may not turn on the NAT functionality for you.
YMMV, but I hope this helps someone
I think tor has some android proxy service, should help.
I recently started looking into the data applications, especially the free ones send to the net.
I wanted to know if they leak personal data to their coders.
Therefore i decided to redirect connections through a proxy software on my computer.
I installed http://www.charlesproxy.com/ and added their ssl ca to the trusted certificates on my cellphone.
It was quite intresting to see what kind of requests certain apps make to the internet, especially when you look inside the ssl encrypted connections.
I then found out that some connections seemed to be missing from that analysis, not enough traffic showed up in the proxy compared to the network activity.
So i used https://play.google.com/store/apps/details?id=lv.n3o.shark and the resulting file was quite a few times bigger.
It contained connections to other ports than 80/443 which i saw in charles.
So my questions are: Does Android ignore the proxy for non http(s) requests?
How can i redirect EVERY request to my computer and strip the ssl from it to look inside?
I suspect some of the applications to use basic stuff like json, xmpp and xml but cannot proof it currently.
As a beginner, i might also be using the wrong tools.
You may be able to run tcpdump on your router to see what exactly your phone is connecting to, then see if it corresponds to your proxy traffic.
that does not help to look inside the ssl encrypted tunnel unfortunately
Open question to all, especially if you frequent establishments with open wifi --- What if any security do you use? I'd hope some kind of Firewall, possibly private VPN? And more importantly have you actually verified it provides you with any kind of security?
My issue is this - No matter what I do, cellphones leak data like a waterfall. Seems basically impossible to tell the damn devices to stop broadcasting to the world. Don't call home to clients1.google.com (or any incarnation thereof, and there are many). Don't enable bonjour / zeroconf. Etc.
I literally have no browser installed yet I noticed connecting to open Wifi with portals bring up some kind of browser. Does it store cookies? Does it leak my device id, model, serial # .. IMESI? (believe it or not some applications try to stuff that in an HTTP header).
One of the biggest reasons I ever rooted my phones is I've tried rootless firewalls, they do nothing but have a nice gui.
It's bloody infuriating.
Hello everyone, I am a new networking and sys admin grad so would love to know if my thinking is incorrect or I am missing anything.
I am cursed with no high speed access where I live rurally so...I use work/coffee shops to do some downloading on my S10.
I use Tor and AirVPN, forced UDP protocol 443.
I have checked multiple times and cannot find DNS or WebRTC leaks with Air (happy with their service overall)
With a popular port for traffic, checking these leaks, and using Tor/VPN (with killswitch on) my question is:
How secure is my activity? Essentially...since I have no access at home I download shows and movies with the Flud client.
On top of a torrent client would it also be secure to grab it from MEGA/Tezfiles? I see maybe a higher WebRTC risk but am I correct in thinking for what activities I am doing I am pretty much safe? Since activity is piracy and not like dark web or anything for them to truly deep dive.
Thanks for the feedback!!