There are a few good blockers for non-ROOTed Android devices, but since version 3, Blokada has a useful extra function usually reserved for ROOTed devices.
Since v3 it will now let you set alternative Domain Name Servers.
Blokada is overflowing with blocking options, which at first glance are somewhat overwhelming, but once you poke around you can see they are broken down into sections with clear info describing their use.
It also has sensible groupings for different RAM footprints, which is very useful for low RAM devices.
Like all the best blockers it is banned from Google play store as it will block Google trackers and adverts, so the release in the play store will only change your DNS.
Standalone DNS changer
@catweazle Thanks for the info. I only use the Gift cards when I want something from apple, but that is rare as I have old apple tech.
Will be on guard for phishing attempts and invitations to Family Sharing!
"Identity consistency between browser and cookie jar"
to "disabled" under "vivaldi://flags" nonetheless.
If that altered setting is just superfluous/unnecessary and doesn't break things, good.
@millerb270 said in Fox News won't open--"Not Secure" comes up:
I think the problem is that the owners of vivaldi don't want fox news on their browser.
No, wrong – Vivaldi owners do never block websites.
If your Fox News does not show correctly, check if you have extensions installed in Vivaldi, check your Internet Security software, check your proxy and/or VPN connection (if you use any).
As nice as it will be to close the holes with unencrypted traffic this doesn't really solve very much at all. At the end of the day the snooper still knows which IP your requests are going to and therefore the vast majority of the time what site you are visiting. Sites using SNI tend to be closely related to other sites on that same server - usually subdomains of the main domain or domains owned by the same company, so even if I don't know that you visited abc.acme.net, I still know you visited an acme.net site. e.g. google.com isn't sharing servers with microsoft.com.
I would also expect adoption to be extremely low since it requires both generating the keys - this part could be handled automatically as part of the webserver setup and therefore causes minimal concern, but also publishing the public key in a DNS record which is something barely anyone except dedicated sysadmins, a few good shared hosting/CDN companies and enthusiastic hobbyists will bother to do. Just look at the pitifully low uptake of CAA records etc. TLS by default only really gained ground because of Let's Encrypt making the process as painless as possible, but scripts run on the webserver are not going to have access to change DNS records.
@pesala For a company proclaiming it "will do no evil" I am quickly losing trust, even to the point of moving my google docs to OneDrive.
There is more on the from the nakedsecurity security blog including info on a Class Action suit launched against google in the last few days.
I won't repeat it here but briefly, apparently, google knew of the flaw about seven months ago (what happened to Project Zero where google discloses bugs, and sets off a 90 day deadline to fix them????), It was fixed but never reported and google who was affected!?!
@dantesoft Yup, page scrolling, hyperlinks et al -- all seems "normal" to me on that page & child pages launched from it. In fact [this will sound silly], i had actually completely forgotten all about SSI for a long time, & only rediscovered a few days ago that i am in fact running with it [ie, given it is mega-yonks since i last bothered looking at my flags, it's ipso facto also mega-yonks since i last re-enabled SSI]. Wrt other flags, nope. In past years i have run my V's with a plethora of specific flags set at non-default values, but during some extensive troubleshooting [wait for it] mega-hyper-ultra-yonks ago i never bothered re-enabling any of them again afterwards, except SSI.
@greybeard said in How do you protect your system?:
...I also always Disconnect from the network when doing such a scan as this prevents any malicious code from "Calling Home" to disrupt the scan...
Thank you for your attention. I used to be more careful than now, including putting the system into safe mode to perform some scan, depending on the circumstances. I am currently forgetting this care.
@dr-flay said in Beware of the Facebook VPN:
@anajames said in Beware of the Facebook VPN:
The reason I have never opted for a free VPN service. Free VPN service means you have to pay a price for it in some other way and that is definitely your personal data.
That is only true for totally free services. There are free VPN accounts with limited speeds, data allowance and exit nodes. They make the money with people upgrading to a premium account.
I don't need a VPN very often or for big things, so the free Avira VPN does me just fine.
Invading your privacy is not the only way to make money when offering free services. There are often paid upgrades or other products available.
If you only use a VPN in a timely manner, for example to watch a restricted video in your country, a free trusted VPN can suffice (For this, it is often enough for me to use the Startpage proxies or watch the video in its search result. For this I like Startpage), but this, many free are not, some are directly a fake, traffic with your data or they even steal bandwidth, using your IP as a server.
In the free VPN you have to be very careful, nobody gives anything for free and a server always costs money.
Always read the small letters in their conditions of service.