• General
  • New GrapheneOS user Adtech mitigation

  • [deleted]

  • Edited

Autogeneratedusername There are many approaches to privacy too. Just blocking adtech isn't privacy.

@Autogeneratedusername Also do note that apps can communicate with each other even if they are in seperate profiles, provided that both of them have the Network permission. This type of communication is done via localhost, which is the device itself in networking, but routed by the TCP/IP layer

    6 days later

    Last year i ran GOS for 6Months.
    Yes you have to put in extra work to stop adtech, but its possible (depending on your usage)
    Then i switched back to stock.
    I never had my mind at peace since (a bit exaggerated maybe).
    The things you have to do on OS level to get the same privacy from GOS is just impossible. Even if you try, you'll never now for sure what you Phone is doing in the background.

    Finally switched back to GOS, setup my humble 10$ monthly donation via github and will never look back.

    The only thing i want to be able is to be in control of what my phone is doing. Nothing more.

    I use MullvadVpN with Ad/Tracking blocking on DNS level. This is good enough for me. Just be aware what apps you are using and what data you give them willingly, not Ad/Tracking Blocker can save you from that

      a month later

      FlyingRacoon Hi can you explain more about what the ad/tracking blocking on Mullvad does?

      I'm currently exploring the option for me to use mainstream apps on my GOS device, while also blocking tracking that is bundled with the app.

      For example, take the simple payment app, Venmo. It constantly uploads device and profile data to google and other tracers.

      Does this MullVad tracking blocker make great strides in blocking this, while maintaining the functionality of the app?

      Thanks

        6 days later

        protonuser2
        You shouldn't rely on such tracking blockers for effectiveness. These blockers might block some addresses and IPs that an app like venmo uses to connect to analytics servers to upload data. However blocking these paths does not guarantee actual blockage because apps like venmo could be programmed to send data to their own server if the analytics server path is failing (as a back up plan). You will not then be able to block that path because it might disable to whole app. Therefore blocking "trackers" through network blocking "might" help, it also might not. Hence its not reliable.

        The better way to deal with this is to let the app upload "all it wants" but actually not have any actual "data" to upload. By isolating an app in a separate profile you are giving it a separate androidID and preventing IPC. This strongly limits the app from acquiring any more data about your system than it already has access to. This is better than having apps in one profile and using blockers. You could use blockers on that profile but in reality its not necessary at all. Makes no difference.

        10 days later

        User2288 I keep a PKM database, may I put your blog-less write up into my PKM for both personal use and for others who may ask this again on here in the future?

          N3rdTek Off topic, but may I ask what app(s) you use for your PKM ?