It's functions similar to other mobile ad-blockers in that it can route all your phones traffic over a VPN tunnel it establishes.<p>But the ad-blocking vpn server is 127.0.0.1, so perhaps, like it says all the blocking happens right on your phone.<p>This is what I've been waiting for if this works.<p>Still getting ads on instagram though.
Looks like the core of this is done via <a href="https://developer.apple.com/documentation/networkextension" rel="nofollow">https://developer.apple.com/documentation/networkextension</a><p>some cool stuff here:<p>- Content Filter Providers: <a href="https://developer.apple.com/documentation/networkextension/content_filter_providers" rel="nofollow">https://developer.apple.com/documentation/networkextension/c...</a><p>- DNS Proxy Provider: <a href="https://developer.apple.com/documentation/networkextension/dns_proxy_provider" rel="nofollow">https://developer.apple.com/documentation/networkextension/d...</a>
Is there anywhere with an in-depth overview of what this does? Does it just fail DNS request and block known IPs? How are the lists maintained and updated? With TLS and it surely not mitm-ing connections, that's all it can do correct?
It's "open source", but there's only been 5 commits since August last year? Where do the updates to blocking rules etc come from?<p>Also, the homepage states "Over 1 Billion Trackers Blocked", but that really feels misleading.<p>I'd say Guardian Firewall is a much better choice: <a href="https://twitter.com/guardianiosapp" rel="nofollow">https://twitter.com/guardianiosapp</a>
On macOS, we got a port of OpenBSD pf (probably not up to date though). I've been able to convert hosts files to OpenBSD pf format in, when was it, 2002? What you'd need to do is create an anchor. Perhaps there's a GUI for it as well for those who prefer. There's at least pfBlockerNG which basically does that for PfSense. [1] FWIW, all of this existed before Pi-Hole (or Raspberry Pi for that matter). IIRC there was also a converter script for hosts files to IPTables rules.<p>Is it possible to import such rules to Little Snitch? That's the go to firewall on macOS, though it is proprietary. There's also LuLu, a FOSS firewall for macOS. [2]<p>Now, from my memory, these block lists did cost quite some memory on a machine with 512 MB RAM. Even though it'd do dedup. What one could also do is build up a VPN with a remote server (in the cloud, or at home) and use say use WireGuard to have a secure connection while using a remote DNS on the VPN to get ads blocked.<p>[1] <a href="https://www.linuxincluded.com/block-ads-malvertising-on-pfsense-using-pfblockerng-dnsbl/" rel="nofollow">https://www.linuxincluded.com/block-ads-malvertising-on-pfse...</a><p>[2] <a href="https://github.com/objective-see/LuLu" rel="nofollow">https://github.com/objective-see/LuLu</a>
As a pihole user for years I recently bought a firewalla blue. Installed pihole on the firewalla, turned off firewalla ad blocking, and done.<p>I can VPN to my home ad blocking network from anywhere, have more insights into my home network shenanigans, and still use my personal block list built over years. Super easy and most importantly, done.
The unfortunate truth is, Apple does not allow us to use a firewall on iOS.<p>This is a DNS-sinkhole, which can be easily circumvented by apps (for example by using hard coded IPs.)<p>I would say it's rather dishonest to state your app is a Firewall on the front page, when in fact it is not.
I gave this a try on macOS, but I still see all the ads I'm used to.<p>It looks like the block lists are really short (<a href="https://github.com/confirmedcode/Lockdown-Mac/tree/master/Block%20Lists" rel="nofollow">https://github.com/confirmedcode/Lockdown-Mac/tree/master/Bl...</a>).
For an open source app distributed on the App Store, is there actually any way of verifying that what you get on your phone is the same as the source code you can read?