in the last time there are more and more apps, for which I have to show them my IP adress. Without they have bigger problems working. For example Antennapod, Applounge, Browser, DB Navigator, and others… Why is this? Where can I give the feedback?
what kind of misbehaviour is occuring when hiding your ip address?
I can confirm that Internet connection is exetremly slow and therefore some apps are slow or not even loading. Ia there something else you habe recognized?
I’m experiencing that kind of troubles too. Many apps are now able to know whether or not you’re using a vpn, and thus, are able to block you if you do use one. I’m afraid there’s nothing for us to do except making vpn devs aware of the problem. Try to write a comment or open an issue on the github/forum of your vpn.
I’d wager it’s the remote end penalizing TOR traffic. In Antennapod you have many endpoints you talk to (per subscription), some of which could penalize TOR. On the Browser it depends on the provider. Hard then to make guarantees on availability if the provider feels there is too much abuse.
Everyone’s threshold is different, and I’m glad that TOR routing is available and enabled by default. For me, though, routing my traffic through TOR is a bit too much. Some apps talk to servers that block or functionally-block TOR traffic (banking apps are common), and there are at least rumors that a plurality of the exit nodes are run by the sorts of folks we’d probably want to avoid sending traffic through, anyway.
What I’ve found makes me happy-enough is to either use a commercial VPN service (surfshark, expressvpn, proton, etc.), or to roll my own. ocserv is pretty simple to set up (it’s an apt-get install command, a certificate/key pair, editing a config file, and enabling a systemctl), and can run on a $6/month DigitalOcean droplet or a $5/month Linode Nanode, or an Oracle Always Free AMD instance. Combined with the Cisco Secure Client, it can easily route all your traffic through a commercial datacenter - not true anonymity, of course (a determined investigator could probably subpoena the cloud vendor), but it at least routes the traffic through a regional datacenter that avoids some of the most common forms of IP-based location harvesting.
Not sure if it helps, but putting it out there based on the statements regarding the shared experience.