okso 6 hours ago

Installing NetGuard was revelation regarding the amount of tracking in most Android apps.

You can configure it to block access by default and notify you every time an app attempts a new connection. And it rings all the time.

Some software call home at 4am every day, other every hour, some send data to a dozen "analytics" services - services that I never opted-in for, which shows how few apps respect the RGPD.

At least most apps still work when those are blocked, and NetGuard allows you to block connections to Google servers except for Google Apps, which network firewalls and DNS solutions can't.

dsissitka 10 hours ago

From the developer of FairEmail.

Every once in a while I consider making the switch to KeePassXC. I trust KeePassXC but I don't really trust the mobile apps so last time around I looked into NetGuard. It's really nice but it wasn't a good fit for my use case:

> NetGuard will do its best, but it is limited by the fact it must use the Android VPN service. This is the trade-off required to make a firewall which does not require root access. The firewall can only start when Android "allows" it to start, so it will not offer protection during early boot-up (although you can disable your network before rebooting). Also, the Android VPN service needs to be restarted to apply new rules when connectivity has changed or when the screen is being turned on or off. It will, however, be much better than nothing.

I believe that also means you can't use it with Tailscale or similar.

  • distances 5 hours ago

    > I trust KeePassXC but I don't really trust the mobile apps

    I'm using Keepass2Android Offline. It doesn't have the network permission, which for me adds a ton of trust already.

    Of course there are other ways to infiltrate data too, but you can be only so paranoid if you want to get things done.

    https://play.google.com/store/apps/details?id=keepass2androi...

  • dugite-code 9 hours ago

    > I believe that also means you can't use it with Tailscale or similar.

    You sort of can. It can route over a socks5 proxy to the work profile where you can have a second VPN running. Wouldn't be an easy solution, but it can work

  • transpute 9 hours ago

    > better than nothing

    Is "nothing" the only Android per-app outbound firewall alternative to NetGuard?

    • Springtime 6 hours ago

      At the OS level LineageOS offers per-app network permissions, which I've used and functions as expected.

      One quirk from what I understand of this ticket[1] is if there's a proxy set up via a separate internet allowed app it can bypass the restriction via that app. GrapheneOS' implementation is said to prevent this.

      [1] https://gitlab.com/LineageOS/issues/android/-/issues/3228

    • pmontra 6 hours ago

      I've been using Blockada for many years but that's a firewall against ads and trackers. No ads inside apps.

      Ideally I would use NetGuard to block the apps and Blockada to block ads and trackers for the apps that I allowed to perform network traffic in NetGuard. But Android allows only one active VPN and they can't be chained, so it's a hard choice. Actually it's not so hard: I keep blocking ads and trackers.

      • saint_yossarian 4 hours ago

        NetGuard does ad-blocking with a DNS blacklist, but it's a Pro feature (which I use and works great).

      • Onavo 5 hours ago

        Blockada is most likely a DNS level blocker, netguard supports that. Alternatively you can configure it to point the DNS servers at NextDNS if you just want a nice UI to configure block lists (though NextDNS might track you).

        • esperent 5 hours ago

          NextDNS as a manual DNS server on Android is the adblocking solution I've been using for years. Is there any reason to believe they would track you, any more than any other DNS provider?

    • colordrops 9 hours ago

      No, if you have a rooted phone you can use AFWall+. And there are other non-root firewalls.

aucisson_masque 4 hours ago

Pcapdroid is a very good alternative that allows to see which connections are made from what app to what server and at what time.

You just leave it in background, check one day later and see what sneaky app you never thought of have been sending tons of data in the background.

For me it helped me remove and search alternative for 4 apps, including a pill reminder (mytherapy). I would never have thought the trade-off to be reminded to take vitamin would be to constantly spy on me and sell all my data. Had i known, I would have put a reminder in my calendar.

  • g-b-r 4 hours ago

    Except that... that doesn't block anything??

qwertox 5 hours ago

Its' really telling that Google doesn't offer an API to access a firewall which provides a clear list of connections and the apps which create them and a way to prohibit such specific connections, possibly also according to blacklists.

They really don't want users to have control over this.

noname120 2 hours ago

AdGuard is also rootless, but in addition if you have root then it can install a system-wide certificate that enables it to decrypt HTTPS requests to do granular filtering (not just at the domain level). Basically just like uBlock does, except that it's system-wide and works in all apps[1].

[1] Except apps that pin their certificates. But you can exclude those or install another module[2] (not from AdGuard) which disables certificate pinning.

[2] For example: https://github.com/cryptoexpertssss/TrustMeAlready

notpushkin 7 hours ago

This is really good. Using it on my Oculus to block connections to Facebook servers.

(On my phones, I use LineageOS which can manage network permissions per app right in app settings.)

p0w3n3d 7 hours ago

I'm using netguard. It's really good, but conflicts with wireguard (another VPN I am using). It's because the firewall is realised using VPN API, when running netguard it uses VPN API to control the traffic

  • okso 6 hours ago

    I am dreaming of an open-source app that adds Wireguard capabilities to NetGuard or vice-versa.

    Having to switch from one to the other is very annoying.

    • p0w3n3d an hour ago

      especially that Wireguard silently disables NetGuard, and then the communication undergoes (at least in my case) silent

acidburnNSA an hour ago

Does this show anything at all without purchases? I installed it and turned on notify on access and I have gotten no notifications so far.

microflash 9 hours ago

Is there something like this for iOS? I know Adguard but it is not open source.

  • alibert 4 hours ago

    Something already included in iOS is App Privacy Report feature.

    https://support.apple.com/en-us/102188

    • halfcat 2 hours ago

      This doesn’t seem to show any site I browse in the DuckDuckGo app, which raises the question, if DDG can hide connections it makes from showing in privacy report, can any (more nefarious) app do the same?

  • radicality 6 hours ago

    Isn’t AdGuard just dns protection (and Safari extension). Afaik something like this isn’t easily doable in iOS. Some options are:

    * Shadowrocket - you can set complex rules on what hosts/connections should be routed by what, but afaik you are not able to isolate traffic on a per-app basis.

    * I think you can set up per-app VPN on iOS, but you must use MDM, can’t do it on an unmanaged profile. Link: https://support.apple.com/guide/deployment/vpn-overview-depa...

    • transpute 5 hours ago

      > per-app VPN on iOS, but you must use MDM

      Yet iOS allows Safari per-site VPN without enterprise MDM, via Apple Configurator profile.

  • varenc 5 hours ago

    The APIs to implement traffic policies on a per-app basis just don’t exist on iOS. You can create a VPN connection and have an app manage all network traffic that way, but you can’t associate traffic with specific apps since this would run afoul of their sandbox. At least without jailbreaking.

  • newscracker 5 hours ago

    I came here to ask a similar question, looking for alternatives to Lockdown Privacy on iOS/iPadOS. [1] I've been using Lockdown for some years as a local and system firewall to block trackers across all apps, but this company got sold a few years ago and has since been annoyingly and frequently pushing for its paid subscription. It also moved some free blocking lists to the paid subscription.

    Any alternatives to Lockdown on iOS/iPadOS would be nice to know about.

    [1]: https://lockdownprivacy.com/

  • saagarjha 5 hours ago

    Only in China I believe.

user070223 6 hours ago

Don't forget to periodicly update the hosts file: Settings -> Backup -> Download hosts file.

The creator also made XPrivacyLua (hooks Android API system calls to block premissions)

extraduder_ire 2 hours ago

While I'm normally not someone who pays for apps, and is annoyed at fdroid releases having paid features, I had such a fun time figuring out and bypassing the challenge/response part of the app (without just commenting it out and recompiling) that I decided to send €1.23 his way.

tuananh 2 hours ago

is this the best available option on Android? Is there any alternative I should give a try?

udev4096 8 hours ago

Afaik, this requires an active VPN connection. With GrapheneOS, there is a network toggle which disables the INTERNET access to any individual app so it doesn't make sense to use NetGuard

  • str3wer 7 hours ago

    > it doesn't make sense to use NetGuard

    unless you use any other phone that is not a google pixel running GrapheneOS

    • palata 4 hours ago

      Which is literally the meaning of "With GrapheneOS, [...] it doesn't make sense to use NetGuard", isn't it?

    • notpushkin 5 hours ago

      LineageOS has this too, and it’s available on a fair bit of non-Pixel phones.

      • udev4096 5 hours ago

        LineageOS doesn't really cut off the INTERNET access properly. Graphene's approach is more robust. I still wonder why such an important feature is not in the AOSP itself

        • aucisson_masque 4 hours ago

          > still wonder why such an important feature is not in the AOSP itself

          Really? Remind yourself who works on Android. Google have been removing functionalities that benefit privacy for ever, and then put half backed alternative buried under tons of settings.

          • udev4096 3 hours ago

            I am well aware of that. AOSP still has quite a lot of contributors outside of google

  • attendant3446 2 hours ago

    NetGuard allows you to block specific hosts. I use it on GrapheneOS for monitoring and selective host blocking.

  • wanderingmind 7 hours ago

    It can do other things. It can monitor network traffic and block ads within apps through multiple host files . Also having a single app to toggle is more UX friendly than toggling multiple apps network access.

    • udev4096 5 hours ago

      Running pihole as your home DNS is far more feasible for blocking ads and other intrusive requests. The UX perspective is a valid point

      • prmoustache 4 hours ago

        But that ties you down to connecting to a vpn every single time you leave home.

        • udev4096 3 hours ago

          You can have a remote instance of pi hole, normally renting a cheap VPS

  • saint_yossarian 4 hours ago

    I use NetGuard on GrapheneOS to block mobile data for certain apps.

palata 4 hours ago

How does that compare to having filtering done by the VPN? Many VPN services tend to do that nowadays, right?

cinntaile 3 hours ago

When you try to purchase pro features it should really display the price...

mcsniff 8 hours ago

AOSP has a pretty well functioning firewall, good enough that GrapheneOS implements and builds on it.

https://grapheneos.org/faq#firewall

Yeah there's no stats or traffic info, but until Android has a real way of using multiple VPN interfaces or exposes adding routes to users/apps, these VPN-based local tools are a no-go.

lopkeny12ko 8 hours ago

How do you use this if you already have an always-on VPN enabled?

  • dilawar 8 hours ago

    You cant. It complains that some other VPN is already running.

kyleee 10 hours ago

Software worth paying for. I bought a license for a Google free lineage os phone that I’ve since moved on from, but still use as a media and general purpose computing device.

stevenhuang 9 hours ago
  • transpute 9 hours ago

    > similar but open source

    Netguard (per HN title) is open-source GPLv3: https://github.com/M66B/NetGuard

    Rethink uses cloud services by default?

      The [DNS] resolver is deployed to Fly.io at max.rethinkdns.com 
      and Deno Deploy at rdns.deno.dev too, 
      apart from the default deployment on Cloudflare Workers.
    • ignoramous 8 hours ago

      rdns dev here

      > Rethink uses cloud services by default?

      There isn't anything sinister going on here with the use of "cloud services" [0][1]. Rethink, which is geared more towards anti-censorship, has its default resolver "ip-fronted" on Cloudflare (whose IPs are seldom blocked) and it works great in countries where the app is popular.

      Users can opt to switch to any DoH, DoT, ODoH, DNSCrypt v3 resolver of their choice. In fact, we encourage users on our reddit/telegram groups to use ODoH (we also run a public-facing ODoH proxy) and DNSCrypt upstreams because of their privacy guarantees.

      [0] If anything, hosting it cost us a bomb: https://old.reddit.com/r/rethinkdns/comments/17h2y6r / https://archive.md/slpZ9

      [1] Our stub resolvers are open-source & "open deploy" (ie deploy straight from github actions): https://github.com/serverless-dns/serverless-dns/actions/

      • justmarc 7 hours ago

        FWIW, Netguard's UI feels like one of an average opensource mobile app, while Rethink is a very polished experience. Well done!