scanning a random qr code has to be this generation’s plugging in an unknown usb drive.
scanning a random qr code has to be this generation’s plugging in an unknown usb drive.
say what you will, but online gambling being the most blocked category is heartening to hear.
the core benefit was in adoption. it was easy to get parents, for example, saying that they jist have to bother with one app for all of their messaging.
the minute they have to contend with sms and signal, they don’t mind adding whatsapp in the mix as well.
wouldn’t those funds be better invested into developing a hard mode that makes you fly only boeing aircraft?
we’ve found the early bird.
there are a few time trackers on f-droid that seem to fit thia requirement.
“a time tracker” is one.
all good info. and all agreed. but the issue in this post isn’t the vpn functionality.
it’s what the adguard android app does in the background when the vpn, itself, is disconnected. that’s when these rogue requests were sent.
this is a possibility. one that i haven’t accounted for.
but is there any literature that verifies this? the closest I’ve found in context is this page, and I’m not able to resolve what you’re saying with whats on there: https://adguard.com/kb/general/ad-filtering/filter-policy/
i don’t have enough info yet to update the post with this conjecture.
the vpn wasn’t connected at the time these requests were sent. that’s how DDG captures these requests, by using the vpn slot itself. these requasts were sent by the adguard app in the background when it was deactivated.
the data sent to third-party ttrackers had nothing to do with the vpn functionality or of other apps funneling their data through it.
this observation has also been corroborated by another user using other means elsewhere in the comments. do give it a dekko, too.
yes, that’s my question too.
i get what you’re saying, but the vpn was inactive when the app sent these requests. DDG was active at the time and using the VPN slot.
so it isn’t the vpn functionality, per se, of the app that’s doing anything here.
i get what you’re saying, but the vpn was inactive when the app sent these requests. DDG was active at the time and using the VPN slot.
so it isn’t the vpn functionality, per se, of the app that’s doing anything here.
i can see where you’re going with this but, no, these are not sites that i’ve visited. for example, my country has its own amazon domain and verizon does not operate where i live.
nope, this is all the adguard vpn android app on its own.
thanks for the feedback. i would be happy to hear what I’m presuming incorrectly here. always willing to learn and gain an understanding of how things do work.
wow. this is good detail, indeed!
so is this an app one should avoid using, then?
would you have done this with the ad guard vpn deactivated but the app still running in the background?
I’ve been using the app for a few montha now and it’s only today that it got flagged in the DDG report. it’s not shown up before.
you are correct. activating one switches off the other. but the adguard vpn app still runs in the background even with its own vpn deactivated – and that’s when these requests were caughtin DDG’s net.
it’s DDG that’s active, and which has filtered out these tracking requests sent by the adguard vpn android app (with its own vpn inactive) in the background.
you’re correct, it’s what the adguard app gets up to in the background.
the two vpns are not concurrently active.
maybe they just laid off the titchier ones so that the average size of team members did indeed increase.