Your mobile device NEEDS firewall profiles
from liminal@lemmy.ml to privacy@lemmy.ml on 02 Mar 2025 16:16
https://lemmy.ml/post/26648039

Does the school you go to need to know that you have the Signal app installed on your phone, checking with the Signal servers in the background for new messages? Even if you chose to use a VPN to tunnel your traffic entirely, is there no other option but for your employer to witness you connected to a foreign VPN server? If you connected to a point at your home, even that could be interpreted that you have something hide.

You could have two phones with different sets of apps in your pocket (one for “business” and one for everything else), but you if you don’t want that you have to ask:

Is there a firewall for Android that can block your usual traffic from leaving the device, by turning on a specific profile based on something like the Wi-Fi name? There are quite a few traffic blockers, such as RethinkDNS, Netguard, or personalDNSfilter, but they assume you want to block the same set of traffic regardless of time and place.

#privacy

threaded - newest

LodeMike@lemmy.today on 02 Mar 2025 16:52 next collapse

VPN dependent on WiFi?

xorollo@leminal.space on 02 Mar 2025 17:19 next collapse

Do not connect to work or school WiFi networks?

whostosay@lemmy.world on 02 Mar 2025 20:44 collapse

Hey that’s my solution

hakunawazo@lemmy.world on 03 Mar 2025 12:44 collapse

<img alt="" src="https://lemmy.world/pictrs/image/19476d99-27bc-442b-8572-1554eda57fc3.gif">

RandomUser@lemmy.world on 02 Mar 2025 17:32 next collapse

Surely the simplest approach is not to use a wifi ssid that you don’t trust. Yes, mobile broadband is slower and more expensive, but is also more under your control, it is however harder for your boss to monitor.

If I was an it manager I’d probably want to keep an eye on WiFi traffic, even on the open ssid, just to see what’s going on. I don’t trust free WiFi.

If you can’t use 4/5g, and can’t find a suitable firewall or VPN, can you set up a different user on your phone? - and be disciplined in is use.

ReversalHatchery@beehaw.org on 02 Mar 2025 17:33 next collapse

fuck all the bosses that would try to excert control over my phone

9tr6gyp3@lemmy.world on 02 Mar 2025 17:45 next collapse

GrapheneOS has the profiles that you are asking for. Configure them how you want.

GrapheneOS- Features

[deleted] on 02 Mar 2025 18:21 collapse

.

aguasemgas@lemmy.eco.br on 02 Mar 2025 20:06 next collapse

That’s something that always bother me (Especially with Android), why that fuck can I not choose which networks can my apps access if access at all??? Is my device damn it! And I know Android supports is just locked away from users

Coldmoon@sh.itjust.works on 02 Mar 2025 22:00 next collapse

Just fire up a VPN

stinky@redlemmy.com on 02 Mar 2025 22:13 next collapse

is this post a question?

liminal@lemmy.ml on 02 Mar 2025 23:09 collapse

It’s me asking if there’s any firewall out there that supports profiles. I’ve learnt graphene has this functionality, that’s become one option to go with.

dutchkimble@lemy.lol on 03 Mar 2025 06:32 next collapse

If you do use a firewall, and then use a VPN, your connection to a VPN server will still show up right?

MonkderVierte@lemmy.ml on 03 Mar 2025 12:58 next collapse

Afwall+ (paid version) has tasker integration i think?

liminal@lemmy.ml on 09 Apr 2025 00:30 next collapse

For the record, in almost all versions of Android you can install apps in a isolated environment through Shelter. Apps in this environment get icons in your home screen just like the rest, but don’t share the vpn/firewall connection that you might have active through RethinkDNS, among other things.

You effectively have two sets of apps with different firewall settings. And if you figure out a way to automate the locking down of RethinkDNS (through something like Tasker or Schröder’s Automation,) you would effectively have a mechanism that only lets the small number of apps in the isolated environment work while connected to an untrusted network.

liminal@lemmy.ml on 09 Apr 2025 00:53 collapse

Netguard also has a separate lockdown mode (which only enables a few apps, or none, to go through) that if toggled automatically based on connected network would enable you to dictate which apps can use untrusted networks.

While there are lots of apps that automate some sort of action based on the name of the WiFi network, activating the lockdown mode in Netguard is more specific, and I doubted if it’s even possible. To start, I came up with a Termux command invocation that toggles the lockdown mode in Netguard. After customizing the quick settings (near the notification area) this adb command confirms that this method for toggling Netguard’s lockdown mode really works:

adb shell cmd statusbar click-tile eu.faircode.netguard/.WidgetLockdown

Default Termux doesn’t request the necessary permission which impeded the command from running, however:

java.lang.SecurityException: StatusBarManagerService: Neither user 10472 nor current process has android.permission.EXPAND_STATUS_BAR.

So this is where I’m at, I could probably just use Tasker to like some people do to run the cmd statusbar command, but I also wanted to call some attention to the issue report on the Termux repository regarding this permission.

EDIT: There’s a high likelyhood it won’t work on Tasker without root, and on termux it also wouldn’t work even if you managed to request the permission.