Tracker Control vs VPN : how to choose?

Can you clarify what you mean by this? Are you referring to THIS “Current state of degoogleisation” listed on /e/'s FAQ page?

You go to Settings > Privacy And Security > Trust > Data Protection. (I hope the path is correct as my phone is in french).
You’ll find all your app listed with a logo looking like a mask, that become blue when you click on it. Make all of them blue, except phone and messaging apps. (top right of your screen, you’ll find an help window with explanation of this page).

1 Like

This settings page has gone in LineageOS and /e/OS based on Android Q.

1 Like

Got me a few older phones, flashed and rooted using Magisk. THIS write up you did is amazing! I am in App Manager testing. Now to test integration of DNS/VPN :point_down: alongside the blocking of individual trackers. Thanks again for this!

2 Likes

https://coveryourtracks.eff.org

@marcdw @XjFred or anyone else, isn’t the information in results showing 100% near perfect uniqueness for your canvas fingerprint in EFF’s test above :point_up_2: ? This is of concern to me in relation to the article below :point_down: Does anyone know what Google/FB (or any other big tech) does in relation to utilizing the canvas fingerprint? This seems like a very effective way to track and mine data on users to make $$$ off them for advertising purposes. I love how /e/ is working to completely eliminate Google from the OS level, from my view the next level is the app/browser tactics used and that is why I am so focused on this now.

Brave is the only browser, between all the browser I have tested with the Cover Your Track tool, that passed the test. It is naturally fitted with a anti fingerprinting solution.
Did you get good results with other browsers ?

1 Like

Yep, seems like Brave is the only one to pass out-of-the-box.
I tested Tor Browser, Iceraven, Mull, Bromite, /e/ Browser, and even Privacy Browser (on top of Bromite WebView).

Tor Browser passed the fingerprinting only when security setting was set to Safest. It’s less useful in that mode though.

Most of the others, when using incognito or private tab, I get a “nearly-unique” fingerprint.

4 Likes

Brave is my go to. I haven’t tested may others so I appreciate @marcdw testing and report back here. I posted because I see this as a useful tool that I wanted to make those unaware…aware.

*I have installed InviZable Pro and am a huge fan (I have root via Magisk). Appreciate the suggestion @marcdw. I find it working well with my non-free VPN service. I appreciate the feature in Fast Settings > Start DNSCrypt On Boot (Tor and I2P also listed, not using quite yet). I have my non-free VPN set to run at all times or to “Kill Switch” my data connection. With this set up I know VPN and DNS are masking at all times. Still testing and learning on the Tor and I2P settings.

Another note on App Manager (AM), more testing is needed (comparing directly to Tracker Control) but I am not 100% sure AM is actually blocking trackers in some applications. This, or it is user error on my end. Still needs some testing and will report back.

1 Like

I guess one way to test AM is with apps that have ads. I don’t normally run apps with ads though. Hmm, here’s an example where in-app blocking may be working. On one of my long running ROMs, Bootleggers Oreo, I have an app called Iconzy. I have its ad tracker blocked which causes an error toast to show. When I unblock the tracker the error doesn’t appear. That tells me something is working. Screens below.
But I also don’t see any ads. If there’s supposed to be some kind of ad banner in that area I wonder if something else is blocking them, like AdAway. Will check on that later.

Back before App Manager I used to use MyAndroid Tools to block ads, services, and other things. Definitely worked (most evident when I used to use Tapatalk) but in the years since then the majority of the apps I run are not from the Play Store. Usually I’m blocking app measurement stuff.

2 Likes

Vivaldi showed for me the same result as /e/-browser (blocking everything but unique fingerprint).

1 Like

Brave’s client-side encrypted sync is what pushed my decision as I use it over a few different devices. Are you aware of any other privacy focused browsers that offer the similar sync capabilities across Android and Linux desktop?

*THIS thread may be of interest to you @chogo browser info discussed

What repository is this found in?

I think I found the .apk if this is it👇 not seeing in FDroid or Aurora… Maybe I missed it. Appreciate the info you share, very helpful in getting me over the learning curve.

https://www.myandroidtools.com

Yes, that’s it.
I can honestly say it was THE tool to use awhile back.
Downside might be its age. Last version was 1.6.9 from 2019. Probably targets no higher than Pie. I don’t have anything higher to try it on.

1 Like

particularly interested in this as well :point_down: , XPrivacyLua. Anyone have experience they can share?

I like App Manager if I have root (need to do some testing with ADB over TCP,) (can’t block trackers without root) if I don’t have root Blokada seems to be a good tool for non-advanced users like me (to get VPN and Tracker blocking together, I want my IP masked and TOR is a bit slow for everyday use via InviZible’s TOR setting).

I have a setup on a phone running Magisk (root), App Manager (tracker blocking root level), InviZible (DNSCrypt), non-free VPN service (Mullvad, Proton, etc.) and it works good but it isn’t a daily driver and I am worried about updates with root (especially on a A/B slot setup).

Because of this I am leaning to go with a non-root setup. I am thinking of utilizing the Android system private DNS (Pihole or NextDNS) with Blokada 5 for VPN and tracker blocking, this runs the gambit I believe. I will also utilize Shelter for the worst apps and sandbox them away from my main profile. (trying to do away with non-FOSS apps, easier said than done).

Am I missing anything on a non-root set up?

*Running private DNS ain’t working with Blokada. It has the same issue as TackerControl, it can’t see the trackers to block/filter.

The more I learn the more it looks like rooting is the only way to get encrypted DNS, VPN, and tracker blocking all working together easily (not utilizing TOR via InviZible).

1 Like

How difficult is it to not lose root when updating? Any suggestions/places to go for a newb to rooting on how to handle updates easily (especially A/B slots)? I can search but would love for direction from someone wise in this area.

This thead goes into some thoughtful depth.

1 Like

Sorry to say I won’t be of much help on that topic. My devices are multibooters and run older Androids (KitKat thru Oreo), thus no updates. They also all use SuperSU or Lineage SU (I have never liked Magisk really). I also don’t do OTAs so if a ROM was updated it would be no problem to flash root after flashing ROM.
On my ZTE Axon 7, /e/OS Nougat is the only ROM (of four on the device) that gets updated regularly but it’s been trouble free, from 0.1 to 0.17. I just flash Lineage SU although not really necessary since the addon.d stuff works. Backup and restores have never worked on the Essential for some reason. Even when I was on Nougat.

The one exception is on my Essential Phone with /e/OS Pie running Magisk (the only unlocked device with A/B). Lineage SU wasn’t up to snuff for AdAway, Substratum, or EdXposed. I’m still on Magisk 20.4 there. Any attempt at updating would cause the ROM not to boot. I may try again with version 22.x. Maybe.
One of my pet peeves over the years is how Magisk winds up breaking things after every few updates. Modules breaking with new APIs, out of luck if a favorite module doesn’t get updated to comply (not unlike Xposed modules that don’t get updated when that changes). Root should be simple and just work. But I digress.

An excellent dev by the name of osm0sis on XDA has some tools that may help if you use TWRP and do OTAs on A/B devices. The gist is that it retains TWRP and then one can easily install Magisk afterward. I think. :slight_smile: Never used it before.

Main thread…
[TOOLS][ZIPS][SCRIPTS] osm0sis’ Odds and Ends [Multiple Devices/Platforms]

TWRP A/B Retention Module script (many devices)

1 Like

I totally missed your post about non-root set up.
I have one unrooted and locked device, a OnePlus 8T. That one took some experimenting. Also used Mullvad, Psiphon, Proton, etc.
Using the InviZible help guides I settled on the Shadowsocks FOSS with InviZible as VPN. I thought Mullvad would be a good choice but I just couldn’t get it working with Shadowsocks. Probably me not understanding something.

But everything is working great. Using Surfshark with Shadowsocks FOSS, going through InviZible. The Surfshark IP is shown on the outside, while InviZible handles DNSCrypt. I also have Tor and I2P turned on. Speed is not a problem. Browserleaks.com shows that my ISP’s IP is not being used and DNSCrypt is in play.

Note: In Fast Settings I have “Route All traffic through Tor” toggled off. Browsers do their thing normally but can access onion or I2P sites if needed. Apps that have proxy settings (HTTP or SOCKS5), like F-Droid, Aurora Store (before v4.x), EteSync, Nekogram X, etc., are setup to use InviZible for traffic (Tor I guess). All is good.

EDIT: I realized I sort of repeated some things I mentioned earlier. Oops. Might as well repeat one more thing. When InviZible is in VPN mode it also has a firewall. Can be set to notify when a new app is installed whether or not to grant it internet access.

1 Like

Thank you. Yes some this I read before but it didn’t sync so now I do see additional paths to take/try. Back to the drawing board. Thanks again.