Not what. Who. Xingchen & Rikk are the devs for App OpsMyAndroidTools really great but what is Rikk?
Sent with much love & Android. OnePlus 5T OB33
It's possible to arrange for two apps to share the same Linux user ID, in which case they are able to access each other's files. To conserve system resources, apps with the same user ID can also arrange to run in the same Linux process and share the same VM. The apps must also be signed with the same certificate
3C Toolbox has a fire wall in it thoI am an *extreme* debloater—I recently totally locked up my Tab S5e by messing with Samsung Payment/kgclient and had to go back to stock and start all over again—my nic stands for Tweak it Til it Breaks, after all. I am also, at heart, a minimalist, and strive to rid my devices of *everything* that is, imo, non-essential.
Privacy intruding apps/ops are my first targets and am willing to suffer crashes/lockups to see how much I can disable/delete/deactivate, et al. Four of my favorite tools are 3C Toolbox Pro, MyAndroidTools, App Ops by Xingchen & Rikk, and, of course, AFWall+.
I am an *extreme* debloater—I recently totally locked up my Tab S5e by messing with Samsung Payment/kgclient and had to go back to stock and start all over again—my nic stands for Tweak it Til it Breaks, after all. I am also, at heart, a minimalist, and strive to rid my devices of *everything* that is, imo, non-essential.
Privacy intruding apps/ops are my first targets and am willing to suffer crashes/lockups to see how much I can disable/delete/deactivate, et al. Four of my favorite tools are 3C Toolbox Pro, MyAndroidTools, App Ops by Xingchen & Rikk, and, of course, AFWall+.
I own XPL Pro, and use both. I don't currently have Xposed installed, so didn't think about it.
I own XPL Pro, and use both. I don't currently have Xposed installed, so didn't think about it.
android.app.RemoteServiceException: Context.startForegroundService() did not then call Service.startForeground(): ServiceRecord{e572d61 u0 dev.ukanth.ufirewall/.service.LogService}
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1883)
at android.os.Handler.dispatchMessage(Handler.java:106)
at android.os.Looper.loop(Looper.java:214)
at android.app.ActivityThread.main(ActivityThread.java:7075)
at java.lang.reflect.Method.invoke(Native Method)
at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:493)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:965)
It still blocks apps and otherwise performs normally. Hadn't thought about it leaking data at boot...gotta look in to this. Trying out boot scripts to grab first minute or so of log.When you get these errors, is AFWall+ not starting properly at boot time? If so I'm seeing similar issues where it's not starting properly during at boot and blocked apps are gaining access during this time. I can't check the logs atm but I might see if I'm also getting similar errors later...Pretty much the same setup as you software wise, but phone is a Xiaomi Mi Mix 2S.
:
1) "ipv6 support"
1.1) "disabled" means that AFWall+ ignores any IPv6 traffic and denied apps can bypass the ipv4 policy by using ipv6? Or does afwall+ block any ipv6 traffic in that case?
1.2) "enabled" means that AFWall+ Applies the same policies to ipv6 traffic as tp ipv4 traffic?
2) "only control IPv6 Chains" What does this setting do? What is the difference to enabling "ipv6 support"?
3) I am also wondering that the AFWall+ log only displays blocked ipv4 addresses and no ipv6 addresse at all. (no matter if "ipv6 support" is enabled or disabled) Is IPv6 traffic not logged or does it bypass afwall+?
I have some questions regarding IPv6.
I would prefer to disable IPv6 on my phone completely but this does not seem to work reliable as the system settings in /proc/sys/net/ipv6/ are changed in the background while wifi is enabled/disabled etc.
So at least I want to make sure that all my app policies also apply to IPv6 and that there is no IPv6 Traffic allowed for apps, which are supposed to be denied internet access.
I am not sure about the meaning of some options/settings:
1) "ipv6 support"
1.1) "disabled" means that AFWall+ ignores any IPv6 traffic and denied apps can bypass the ipv4 policy by using ipv6? Or does afwall+ block any ipv6 traffic in that case?
1.2) "enabled" means that AFWall+ Applies the same policies to ipv6 traffic as tp ipv4 traffic?
2) "only control IPv6 Chains" What does this setting do? What is the difference to enabling "ipv6 support"?
3) I am also wondering that the AFWall+ log only displays blocked ipv4 addresses and no ipv6 addresse at all. (no matter if "ipv6 support" is enabled or disabled) Is IPv6 traffic not logged or does it bypass afwall+?
I'm not sure what you're asking, but AFWall is meant to block traffic based on certain rules. Why would you want to use AFWall in order to enable AA? Are you rooted? Custom ROM? What's your environment? Are you currently able to use AA in your car?
I'm not sure what you're asking, but AFWall is meant to block traffic based on certain rules. Why would you want to use AFWall in order to enable AA? Are you rooted? Custom ROM? What's your environment? Are you currently able to use AA in your car?
this sounds like you are using afwall in whitelist mode (blocks everything, and you select what gets access)?
I had to enable traffic for a bunch of XIAOMI system "apps" (they bundle a bunch of apps together so that you don't disable them) that disabled network if they didn't phone home successfully after a couple of minutes. Never buying anything from that underhanded manufacturer EVER AGAIN.
What device you are using? OS and app version? What the default filtering mode? There's any logs while your device try to attempt any connection? More info please.
I'm not sure what you're asking, but AFWall is meant to block traffic based on certain rules. Why would you want to use AFWall in order to enable AA? Are you rooted? Custom ROM? What's your environment? Are you currently able to use AA in your car?
I'm not sure what you're asking, but AFWall is meant to block traffic based on certain rules. Why would you want to use AFWall in order to enable AA? Are you rooted? Custom ROM? What's your environment? Are you currently able to use AA in your car?
this sounds like you are using afwall in whitelist mode (blocks everything, and you select what gets access)?
I had to enable traffic for a bunch of XIAOMI system "apps" (they bundle a bunch of apps together so that you don't disable them) that disabled network if they didn't phone home successfully after a couple of minutes. Never buying anything from that underhanded manufacturer EVER AGAIN.
What device you are using? OS and app version? What the default filtering mode? There's any logs while your device try to attempt any connection? More info please.
Disclaimer - As Usual. I'll not take any responsible if something goes wrong when using AFWall+
AFWall+ is an improved version of DroidWall(front-end application for the powerful iptables Linux firewall). It allows you to restrict which applications are permitted to access your data networks (2G/3G/4G/LTE and/or Wi-Fi and while in roaming).Since the original author of Droidwall
discontinued the project, I decided to keep the app instead of Avast Firewall. I'll continue to add more features as I can.
- Supports 5.x to 13.x
- Import/Export Rules to external storage
- Search Applications
- Multiple Profiles with custom names
- Tasker/Locale support
- Select All/None/Invert/Clear applications with single click
- Revamped Rules/Logs Viewer with copy/export to external storage
- Ability to view the network interfaces
- Highlight system applications with custom color
- Notify on new installations
- Ability to hide application icons( faster loading )
- Use LockPattern for application protection.
- Show/Hide application ID.
- Roaming Control for 3G/Edge
- VPN Control
- LAN Control
- Tether Control
- IPV6 Control
- Tor Control
- Choose able languages
- Choose able iptables/busybox binary
- Supports MIPS/x86/ARM
- DNS Hostname
To get Unlocker without Google services - Please follow the instructions here
1) AFWall+ opt-in for beta program
2) Install AFWall+ and If you have any issues, just send email from (Menu -> Firewall Rules - > Send error report)
AFWall+ is an free & opensource application
Github
Log an issue
Frequently Asked Questions
Many Thanks to @CHEF-KOCH
Translations - Please help me with translations in your language.
http://crowdin.net/project/afwall
- German translations by chef@xda & user_99@xda & Gronkdalonka@xda
- French translations by GermainZ@xda & Looki75@xda
- Russian translations by Kirhe@xda & YaroslavKa78
- Spanish translations by spezzino@crowdin
- Dutch translations by DutchWaG@crowdin
- Japanese translation by nnnn@crowdin
- Ukrainian translation by andriykopanytsia@crowdin
- Slovenian translation by bunga bunga@crowdin
- Chinese Simplified translation by tianchaoren@crowdin
- Polish translations by tst,Piotr Kowalski@crowdin
- Swedish translations by CreepyLinguist@crowdin
- Greek Translations by mpqo@crowdin
- Portuguese translations by lemor2008@xda
- Chinese Traditional by shiuan@crowdin
- Chinese Simplified by wuwufei,tianchaoren @ crowdin
- Italian translations by benzo@crowdin
- Romanian tranlations by mysterys3by-facebook@crowdin
- Czech translations by Syk3s
Version 3.0.1
* Fix: Status toggle widget 1x1
* Fix: Ability to hide ongoing notification (Stop firewall and restart to hide after disable it in preferences)
* Fix: Firewall error notification on oreo and above
* Security: Tile toggle checks for password
* User reported crashes
* Updated translations
Previous version 3.0.0
Features:
* Better support for nougat/oreo and pie.
* Firewall toggle tile
* Adaptive Icons
* Notification channels
* Tor support
Bugs:
* General bug fixes and crash reports.
* Language selection bug
* Filter selection bug
* Compatible with magisk 17.x
* Better handling of background process
* Drops support for 4.x devices
* Update languages
* Updated libraries