FR version is available. Content is displayed in original English for accuracy.
Advertisement
Advertisement
⚡ Community Insights
Discussion Sentiment
0% Positive
Analyzed from 313 words in the discussion.
Trending Topics
#android#vpn#connections#user#etc#corporate#device#apps#block#mitigation

Discussion (5 Comments)Read Original on HackerNews
According to Netguard logs UID 1000 "Dynamic System" appears to try to use the tunnel in an earlier Android version
Blocking UID 1000 connections, and blocking QUIC, has not caused any problems for me
Yet another example of the relative lack of user control, privacy, etc. in corporate mobile OS
Not to mention undesired "side effects" of default use of QUIC
Personally I do not rely solely on apps to block connections/protocols. While they may work to some extent for such purposes, they can also be useful for port forwarding, logging and packet captures with trailers/extensions
To block connections and protocols I set the device gateway to a computer running a non-corporate OS compiled by the user where the user can operate firewalls, DNS, etc. No "rooted device" needed
However... If VPN settings in corporate mobile OS such as Android can be undermined via Android "updates", as shown by this example, then it stands to reason that Network settings for a network interface such as gateway, DNS, etc. could also be undermined by "updates"
With respect to user control, privacy, etc., corporate mobile OS all suck. IMHO they will continue to suck even more as the years go by, as history has shown so far. The vendors' and users' interests on these issues are not aligned, they are in conflict with each other
"device_config values persist across reboots, but a Factory Reset clears them, and a future Mainline update from Google could remove the chicken-out flag entirely. Treat this as a current-release mitigation, not a permanent one."
Life has three certainties: death, taxes and "updates" from so-called "tech" companies
I use Windscribe vpn and it has an option for a split tunneling of apps, so I have a bunch of apps I just let through. But, when I use the 'block connections without VPN' in always on VPN, it blocks those tunneled apps.