Ad blocking is done system wide and it is technically not possible to white list individual apps.
However, you can disabled 'Apply rules and conditions' to disable NetGuard completely for the app.
That works perfectly thank you for the quick reply!
Ad blocking is done system wide and it is technically not possible to white list individual apps.
However, you can disabled 'Apply rules and conditions' to disable NetGuard completely for the app.
For access to special connections, carrier privileges are needed, which are not available to user apps for security reasons:
https://source.android.com/devices/tech/config/carrier
However, it is possible to query for all special connections, see here for all details:
https://developer.android.com/reference/android/net/NetworkCapabilities
Assuming the device is not rooted, only the manufacturer can install software to use the special connection types. So, basically it boils down to the question if you trust the manufacturer.What would be interesting to find out here, is if any apps - whether system, NSA, FCB, or random Chinese spyware - can use this data connection for something other than setting up emergency calls.
Not being an Android developer, with no knowedge of how all this actually works, I think it is best to assume that everyone who wanted a backdoor in my device has put one there.
Well, I assume you have control over the possibility of something in your device making an internet connection through the USB, bluetooth, and wifi.
If you have verified that these are not available to your device, then -
What remains is the cell radio modem.
I did mention previously that even without a simcard the modem will establish a 3G HSPA+ connection, without any trace of that activity appearing in Netguard.
No user accessible app that I know of can use that data connection, but obviously something has access to it or it could not have been established in the first place.
So, basically it boils down to the question if you trust the manufacturer.
Did you set VPN DNS addresses or are you using by default those given by the ISP DHCP server?
Did you set VPN DNS addresses or are you using by default those given by the ISP DHCP server?
You can try to disable private DNS in the Android settings.I did all that I've had netguard for years. I even uninstalled it and reinstalled it and it's still saying ad blocking is not working ?
I didn't change anything from Android 9 on my OnePlus 7 pro except upgrade to Android 10.
I have the international version.
It's the normal settings nothing is changed. I can't understand why it's doing this
You can try to install NetGuard in the Shelter, but be aware that this use case is not supported because too many Android version do not handle the VPN correctly in this situation.Hi, I am using 'Shelter' app to isolate apps. Is there any option to block addresses of the particular apps using shelter?
You can try to install NetGuard in the Shelter, but be aware that this use case is not supported because too many Android version do not handle the VPN correctly in this situation.
It is means that if it doesn't work that you are out of luck.This use case is not supported mean? Will it work? Or won't work totally? How secure it is?
I don´t think that the connection is made this way, because when I "only use Wifi" then the source connection is from my Wifi local IP, or internal IP 192.168.1..., and when I use "4g only" then the source connection is an IANA address: 10.144.178.114
https://dnslytics.com/ip/10.144.178.114
So, the source address isn´t always from 4g, nor from my real IP, only from my local IP.
What I was trying to get at, is how to isolate your device from any possible internet access under the booting up, before Netguard has had a chance to start up.
This is not trivial to do, depending on what wifis there may be near you, but especially wrt to which mobile operators may be available.
You can of course turn off WiFi in your device and put it in airplane mode, before rebooting it.
If things work as advertised, that should work and allow Netguard time to start up before you activate either the WiFi or the gsm network.
But there is no way to easily verify that neither WiFi nor the cell radio modem are activated surreptitiously by something in your device, i.e. without special monitoring equipment of some kind.
It does boil down to whether you trust the OEM manufacturer, the ROM you are running, and even Qualcomm I suppose.
Yes, I reboot the smartphone without internet in airplane mode.
But read what I posted before:
A smartphone with LineageOS + Netguard = the same result as mine with uid1000
A smartphone with Android without Netguard = no result or Google servers with uid1000
But, if Netguard doesn´t connect to Google, as Marcel said, then something weird must be happening...
As long as you don't have full control over the other devices, there is no way to run a controlled scientific test, and there is no way to know why different results are produced.
As long as you don't have full control over the other devices, there is no way to run a controlled scientific test, and there is no way to know why different results are produced.
I have the donated Netguard from Github and also AFwall installed on my phone. Im trying out both apps at the moment. When Netguard is disabled AFwall does register Netguard trying to connect to 172.217.19.196 which appears to be allocated to Google. Is this supposed to happen?
There is nothing in NetGuard that connects to Google, so no.I have the donated Netguard from Github and also AFwall installed on my phone. Im trying out both apps at the moment. When Netguard is disabled AFwall does register Netguard trying to connect to 172.217.19.196 which appears to be allocated to Google. Is this supposed to happen?