NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Download Telegram
personalDNSfilter

Block ads, trackers, analytics and malware domains system-wide (in browsers and apps).
Root is not required

•Runs on Android 4.2 and up
•open source / GPL
•free
•tiny - size is only 92KB
•noob friendly
•expert options / config

personalDNSfilter is a DNS filter proxy written in Java. It hooks into the domain name (DNS) resolution and returns the loopback address for filtered hosts. Available for Java enabled devices including Android (based on VPN)

• It can be used for filtering ads and other unwished hosts based on a host list – Thus it is a good AdBlock alternative.
• On Android devices (Android 4.2 an newer) it can be used as effective ad, malware and tracking server filter without root access
• It works with any upstream DNS server - filtering is completely local - no phoning home or such things
• See dnsfilter.conf file for information on how to configure the hosts filtering.
• personalDNSfilter is preconfigured with the ad host filter lists from http://pgl.yoyo.org/adservers/ via this link (about 2500 entries)
• In case you are interested in a very complete hosts filter, check http://hosts-file.net/ which provides a hosts filter with about 350.000 entries including known hosts for tracking and malicious websites, etc. Find the filter download in the download section. Select a mirror from the hosts.txt download entry.
• You can run it locally on your device or centrally as DNS server in your network.
• Tested on Raspberry Pi.

💫Web and downloads:
https://zenz-solutions.de/personaldnsfilter

💫Sources
https://github.com/IngoZenz/personaldnsfilter

💫XDA
https://forum.xda-developers.com/android/apps-games/app-personaldnsfilter-block-malware-t3567898


📡 @Libreware
#dns #block #ads #hosts #pdnsf
List to block MIUI spyware reporting back to xiaomi servers. The list is huge

Add this link in Adaway -> Host sources :

https://gist.githubusercontent.com/eboye/ef2f8c3e9e3b32c0980ff1a226770b1c/raw/36afd2333c781b5682bf602580a7935649d794b2/adaway-miui-blocklist


Don't worry if it says
Local: not avaliable, Online: not avaliable
It should be working, just test any address from the list

( From @ eboye
https://gist.github.com/eboye/ef2f8c3e9e3b32c0980ff1a226770b1c )


📡 @NoGoolag
#miui #spyware #block #hosts
The Blokada team is happy to announce the public release of Blokada v4.

Changes:
* Brand new UI supporting Android TV and all form factors
* Introduce beta of Blokada VPN
* Add hosts log (blocking history) with search
* Add widgets (by Faedrak)
* Add request logger (by Faedrak)
* Update translations
* Stability fixes

Downloadable from https://blokada.org
F-droid and XDA sources will be updated in the upcoming days (depending on the respective teams)

Enjoy using Blokada


About the UI (Thanks for @Printable_character for it):
1st Page: General information.
If you swipe up you'll find the
built-in VPN-Service
2nd Page: Last ad blocking actions
If you swipe up you'll find
multiple logs and the possibility
to change the Blacklists and
whitelists.
3rd Page: Additional information
Swipe up to find settings which
can adjust the starting, wake-up,
downloading and updating etc.
of Blokada.

Links:
https://t.me/NoGoolag/576


#blokada #block #ads
Russian intelligence service FSB plans to block mailbox.org

According to reports of the Russian media company RBC, the Russian secret service FSB plans to request an Internet block against mailbox.org and other providers. The reason is supposed to be e-mails sent via the providers with bomb threats. As a result, websites or mailbox.org mail services from the Russian Internet may no longer be accessible in whole or in part.

According to media reports, representatives of the Russian telecommunications authority Roskomnadzor state that mailbox.org did not respond to a request for information in the second quarter of 2019 and is not listed in the Russian telecommunications directory "ARI".

Peer Heinlein, founder and CEO of mailbox.org, explains: "We are not aware of any inquiry from Roskomnadzor that we should have answered. We do not have an official letter from the authorities nor have we received a corresponding request for legal assistance from German authorities. Contrary to the statements made by representatives of Roskomnadzor, mailbox.org is not aware of any Russian court decision according to which mailbox.org would have had to release data. If there was a decision, it was never delivered to us. In this respect we are very surprised by the incident and the accusations of Roskomnadzor".

"Of course, mailbox.org would answer legitimate requests for information from authorities. However, these must also be permissible on the basis of the German and European legal situation," says Peer Heinlein. As a rule, foreign authorities would have to choose the path of a request for judicial assistance. "In no case, however, will mailbox.org illegally disclose data of its users to domestic or foreign authorities. Each request for information will always be checked for admissibility by lawyers specialising in this area in individual cases".

"Like every e-mail service, mailbox.org has to struggle with a multitude of fake account registrations on a daily basis. mailbox.org has developed very good defence methods to detect and block abusive fake accounts. We do not tolerate abuse of our service for criminal activities," says Peer Heinlein. If accounts were to be used for criminal activities, mailbox.org would of course cooperate and block them after a very precise case-by-case examination. The Anti-Abuse-Team of mailbox.org would even accept such hints with thanks.

"If a user of mailbox.org sends e-mails with the threat of a bomb attack, this must be condemned in the strongest possible terms and not tolerated," says Heinlein. Of course, mailbox.org strongly dissociates itself from such actions. If, however, a free telecommunications provider is blocked due to individual incidents and all its users are placed under general suspicion, this is exaggeratedly excessive and purely arbitrary. If this then happens without compliance with a constitutional procedure, it would not be tolerable for any democratic state.

👉🏼 Read more:
https://mailbox.org/en/post/russian-intelligence-service-fsb-plans-to-block-mailbox-org

#russia #FSB #IntelligenceService #block #mailboxorg
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Pi-Hole

Network-wide ad blocking via your own Linux hardware

The Pi-hole® is a DNS sinkhole that protects your devices from unwanted content, without installing any client-side software.

Easy-to-install: our versatile installer walks you through the process, and takes less than ten minutes
Resolute: content is blocked in non-browser locations, such as ad-laden mobile apps and smart TVs
Responsive: seamlessly speeds up the feel of everyday browsing by caching DNS queries
Lightweight: runs smoothly with minimal hardware and software requirements
Robust: a command line interface that is quality assured for interoperability
Insightful: a beautiful responsive Web Interface dashboard to view and control your Pi-hole
Versatile: can optionally function as a DHCP server, ensuring all your devices are protected automatically
Scalable: capable of handling hundreds of millions of queries when installed on server-grade hardware
Modern: blocks ads over both IPv4 and IPv6
Free: open source software which helps ensure you are the sole person in control of your privacy

Pihole Info:

https://pi-hole.net

https://pi-hole.net/blog

https://docs.pi-hole.net

https://github.com/pi-hole/pi-hole/#one-step-automated-install

r/pihole


📡
@NoGoolag 📡 @Libreware
#pihole #pi-hole #block #ads
Dropkick Google with Pi-Hole On Your Network
Resource

from https://www.old.reddit.com/r/degoogle/comments/e9ryy0/dropkick_google_with_pihole_on_your_network/

Greetings fellow De-Googlers. Today, as we crest over the 20k mark in membership, I’d like to talk about a tool you can use in your fight against intrusive corporations like Google. I’m talking about a great project called Pi-Hole. Some of you may be familiar with Pi-Hole, while to others this may be new information. If it’s new information, I’m happy to report there is a sub right here on Reddit just for Pi-Hole ( r/pihole ). The mods there are very helpful with any problems you may encounter along the way with this project.

Before I go any further, I’d like to point out that Pi-Hole is open source software, available for free on their website at https://pi-hole.net/. However, I would like to encourage users to donate to this worthy cause and become a Patron of the project.

In a nutshell, Pi-Hole is a Raspberry PI project that acts as an ad blocker. Unlike browser based ad blockers that you may be used to such as uBlockOrigin, Pi-Hole works at the DNS level.

You can run Pi-Hole in a Docker container, deploy directly in conjunction with Raspbian on a Raspberry Pi Zero W, or deploy in conjunction with Centos, Fedora, or Debian or an old desktop running Ubuntu. There are even some folks running Pi-Hole on an old laptop. For all the features of Pi-hole and for what it does, it doesn’t require a lot of overhead to run.

I won’t go into recreating the installation procedures, but I can tell you that with limited tech savvy, anyone can have this set up and running in an afternoon.

So how does this all tie into De-Googling I hear you ask. One of the great features of Pi-Hole is it’s ability to use custom block lists. These block lists contain hundreds of domain names that you don’t want accessing your network. Here is one such list that completely blocks Google and it’s many domains from your network:
https://raw.githubusercontent.com/nickspaargaren/pihole-google/master/pihole-google.txt

Nick Spaargaren maintains this list and his GitHub is located at:

https://github.com/nickspaargaren/pihole-google

If we were to take a peek inside this particular block list, we can see all the domains it will block from your network:

www.googleanalytics.com
click.googleanalytics.com
ssl.googleanalytics.com
www.google-analytics.com
cctldtest.google-analytics.com
click.google-analytics.com

…..and hundreds more! With a couple clicks of the mouse, you can just about eradicate Google from your network as if it didn’t exist. There are tons of other lists that are available for Pi-Hole that will block all manner of things from your network. For now we are concentrating on the Google aspect.

In closing, I will leave you guys with some links to get you started on your way to a Google free, intrusion free network using Pi-Hole.


#pihole #pi-hole #block #ads
NoPhoneSpam

★ FDroid: https://f-droid.org/app/at.bitfire.nophonespam

Block calls from annoying or private numbers on your Android device.

NoPhoneSpam suppresses unwanted calls. Get rid of phone spam and people you don't want to talk with. Just block them. You can determine if you want to see that someone called or even block any notification. NoPhoneSpam is focused on simplicity! It's not cluttered with hundreds of unused features and we don't use any ads.

Features:
Block incoming calls
Use special syntax to block countries or providers or parts of numbers
Add, update and delete numbers
Manage notifications
Simple logging of numbers
Block calls with suppressed numbers

NoPhoneSpam is NOT intended as a feature-rich call-spam fighting app, but as a replacement for Android's missing call blocking feature. If you have Android 6+, you don't need this app, because call blocking should be supported natively!

From the creators of DAVx5
(Maybe needs an update for newer OS's, check Gitlab issues)


📡 @Libreware
#NoPhoneSpam #block #spam #calls
YetAnotherCallBlocker

https://gitlab.com/xynngh/YetAnotherCallBlocker

Block calls from annoying or private numbers on your Android device, using a public 3rd-party spam database.

📡 @Libreware
#YetAnotherCallBlocker #block #spam #calls
Block app components
(receivers/services/activities/ads/trackers...)

Disable Fuck Services script
https://t.me/libreware/735

Watt
https://t.me/libreware/756

Blocker
https://t.me/libreware/745

My Android Tools (closed source)
https://www.myandroidtools.com


Here's a list of things you could disable, it's not complete:

AdIdListener
AppMeasurementService
ContentFiltersService
DailyHygiene$DailyHygieneService
DisplayLeakService
FirebaseInstanceIdService
FirebaseJobDispatcherEngine$FirebaseJobDispatcherService
FlushLogsReceiver$FlushLogsService
HeapAnalyzerService
InstantAppHygieneService
InstantAppsLoggingService
InstantAppsSharedPreferencesService
KeepAliveService
SetupWizardPaymentsEnablementService
WearChangeListenerService
WearSupportService
AdsActivity
Crashlytics
AnalyticsJobService
CampaignTrackingService
AppMeasurementJobService
InterstitialActivity
facebook.ads.AudienceNetworkActivity
Referral.InstallListener
Accountkit
AdAlarmHelperService
AdReminderHelperService
AdTriggerEventsService
AppTrackingService


📡 @Libreware 📡 @NoGoolag
#disablebadservices #blocker #watt #mat #disablefuckservices #block #ifw #intents #services #ads #tracking
Disable Tracking Services
By steveglowpunk

https://forum.xda-developers.com/android/development/script-disable-tracking-services-t4099469

This is a set of scripts that disables privacy invasive tracking components in all user installed apps (service/broadcast receiver/activity/content provider).
Root permission is required to run the scripts.

How it works:
UpdateExodus.sh downloads tracker names from Exodus Privacy ( https://etip.exodus-privacy.eu.org)

DisableTracking.sh will dump a list of components of all installed apps, compare it against the list of trackers name, and disable those components (using the 'pm disable' command) if they match.

Download: Goolag Drive link (https://drive.google.com/drive/mobile/folders/1_G6-M8ToF0PsjY0HIrZIAVrTHT6nbptE?usp=drive_open) or attached below

Check instructions.txt for details on how to use the scripts.
The latest version is 1.5.
You are recommended to backup your apps before running the scripts.

I hope you will find this useful

The script was originally based on #disablefuckservices here:
https://forum.xda-developers.com/android/development/script-disable-fk-services-trackers-apps-t4074427


📡 @Libreware 📡 @NoGoolag
#disablebadservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
Disable Fuck Services script

The goal of this program is to disable many trackers by Google, Facebook and others from the installed apps (and from Google Services if you have them). It will do a search and disable many of the analytics, ads, and firebase services for all user apps

1. Download the DisableFuckServices15.sh file
2. Copy it to /data/local/tmp with some root explorer (I used Mixplorer)
3. Give it 755 permission (also used Mixplorer for this, right after pasting)
4. Open a terminal (like Termux or Terminal Emulator)
5. Do the following 2 commands:
su
cd /data/local/tmp
sh DisableFuckServices15.sh

6. Wait (maybe a couple minutes depending on the number of apps installed)
7. Done

Warning: there is a small chance some apps will force close after this.
If so you can just reinstall them

https://forum.xda-developers.com/apps/magisk/script-disable-fk-services-trackers-apps-t4074427

Changelog : 
- 1.0 : Original version from MOVZX
- 1.1 : add Facebook trackers
- 1.2 : add IAMs trackers read Ars technica article https://arstechnica.com/information-technology/2020/03/4000-android-apps-silently-access-your-installed-software
- 1.3 : more FB adds and chinese trackers too...thank's to @LE CHEVALIER for the help Veyrbin
- 1.4 : I remove some trackers i added myself but without confirmation and I add some flurry adds
- 1.5 : much more trackers...thank's @steveglowplunk for the new ones


📡 @Libreware 📡 @NoGoolag
#disablebadservices #disablefuckservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
Disable trackers from recovery
By @robertoprubio

Useful when you don't have root.
It requires a pc


📡 @Libreware 📡 @NoGoolag
#disablebadservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
Block app components
(receivers/services/activities/ads/trackers...)

Disable Fuck Services script
https://t.me/libreware/803

Disable tracking services
https://t.me/libreware/767

Disable trackers from recovery (no root required)
https://t.me/libreware/808

Watt
https://t.me/libreware/756

Blocker
https://t.me/libreware/745

My Android Tools (closed source)
https://www.myandroidtools.com


Here's a list of things you could disable, it's not complete:

AdIdListener
AppMeasurementService
ContentFiltersService
DailyHygiene$DailyHygieneService
DisplayLeakService
FirebaseInstanceIdService
FirebaseJobDispatcherEngine$FirebaseJobDispatcherService
FlushLogsReceiver$FlushLogsService
HeapAnalyzerService
InstantAppHygieneService
InstantAppsLoggingService
InstantAppsSharedPreferencesService
KeepAliveService
SetupWizardPaymentsEnablementService
WearChangeListenerService
WearSupportService
AdsActivity
Crashlytics
AnalyticsJobService
CampaignTrackingService
AppMeasurementJobService
InterstitialActivity
facebook.ads.AudienceNetworkActivity
Referral.InstallListener
Accountkit
AdAlarmHelperService
AdReminderHelperService
AdTriggerEventsService
AppTrackingService


📡 @Libreware 📡 @NoGoolag
#disablebadservices #blocker #watt #mat #disablefuckservices #block #ifw #intents #services #ads #tracking
Forwarded from Libreware
App Manager
by @MuntashirAkon

Merges the features of many apps (Applications Info, ClassyShark3xodus, Watt, Activity Launcher) in one place along with material design and a reasonable application size

Github: https://github.com/MuntashirAkon/AppManager

F-Droid IzzyOnDroid (until RFP is accepted):
https://f-droid.org/app/io.github.muntashirakon.AppManager

https://apt.izzysoft.de/fdroid/index/apk/io.github.muntashirakon.AppManager

App Manager Support Group:
https://t.me/AppManagerAndroid


📡 @Libreware 📡 @NoGoolag
#appmanager #blocker #watt #block #ifw #intents #services #ads #tracking
Court Orders Telegram To Block Pirated Movies, TV Shows and Music

A court has ordered Telegram to
block access to pirated movies, TV shows and music following a lawsuit filed in Israel. Local anti-piracy group ZIRA complained that the messaging platform does not properly respond to takedown notices, contrary to Telegram's claims that it does. Telegram is now working with rightsholders to implement the injunction.

Last November, the RIAA and MPAA nominated popular messenger app Telegram for inclusion on the USTR’s ‘notorious markets’ list, claiming that the platform doesn’t do enough to combat piracy.

A month later, the EU added the service to its own ‘Counterfeit and Piracy Watch List’, noting that along with other social media platforms, Telegram “lags behind” in respect of efforts to combat piracy.

This opinion is shared by Israel-based anti-piracy group ZIRA. Last year, ZIRA – which represents local media companies – took its complaints to court, hoping to force Telegram to take a more serious approach to infringement mitigation.

https://torrentfreak.com/court-orders-telegram-to-block-pirated-movies-tv-shows-and-music-210210/

#tg #telegram #court #order #block #pirated #movies #music #riaa #mpaa #piracy #watchlist
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Forwarded from Libreware
disable-trackers-from-recovery.pl
23.2 KB
Modified perl script of @ robertoprubio to use the local file

perl disable-trackers-from-recovery.pl --exodus-trackers-pathname <pathname>

where <pathname> refers to pathname of the local exodus file that you've downloaded from https://etip.exodus-privacy.eu.org/trackers/export

#disablebadservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
FLoC Block

Prevent Federated Learning of Cohorts aka FLoC ad-targeting code from running in Chrome.

FLoC, short for Federated Learning of Cohorts, is the new mechanism used by Google Chrome to group users into buckets based on their interests. You can read more about it here and why Brave and some other browsers have blocked it here. EFF did some analysis as well.

💡 How does this Chrome Extension help?

If you HAVE to use Chrome but don't like the idea of being grouped into a bucket (aka cohort) based on the websites you visit, this extension is a simple way to prevent FLoC from divulging your "cohort id" to websites. The extension removes document.interestCohort() from every page so that a website cannot get your cohort id.

💡 How do I install this extension?

👉🏼 Download
flocblock.zip from https://github.com/ShivanKaul/flocblock/releases/latest. Direct link: https://github.com/ShivanKaul/flocblock/releases/download/v0.0.1/flocblock.zip

👉🏼 Extract extension.

👉🏼 Follow the instructions to load into Chrome.

https://github.com/ShivanKaul/flocblock

#floc #block #chrome #browser #tracking #tool
📡 @nogoolag 📡 @blackbox_archiv