my apologies for the long screenshot. i had purchased adguard’s vpn service for five years since its primary adguard service is well know in the iapple ecosystem.

on android, though, their app appears to send data to a lot of third-parties. has it always been this compromised? am i a fool to go for their vpn services as well?

  • LWD@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    Selling? Probably not.

    But I used NetGuard to see specific requests that the AdGuard VPN app made. Then I downloaded AdGuard VPN and opened it. Without even logging in, it pinged:

    • dns.google
    • dns.alidns.com (Alibaba)
    • 2400:3200:baba::1 (Alibaba again)
    • cloudflare-dns.com

    I don’t know why it feels the need to ping so many DNS servers before you even type a username, but it does.

  • Pantherina@feddit.de
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    You are using that Duckduckgo thing which is not a reliable source of information.

    I would be interested in what a “tracking attempt” would look like.

    Your VPN sees EVERYTHING you connect to, if you use HTTPS that is not a big deal but can help target stuff to your usage.

    If it is tracking or just traffic passthrough is decided on their servers, which no weird Duckduckgo app can access.

    • ohwhatfollyisman@lemmy.worldOP
      link
      fedilink
      arrow-up
      1
      ·
      4 months ago

      i get what you’re saying, but the vpn was inactive when the app sent these requests. DDG was active at the time and using the VPN slot.

      so it isn’t the vpn functionality, per se, of the app that’s doing anything here.

      • Pantherina@feddit.de
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        4 months ago

        Thanks, I think it is very relevant to understand how this DDG VPN “tracker blocking” works.

        If it is about an app sending requests to lots of domains, this may have many reasons. For example it could check the IP addresses of all these tracking serverers to block apps from communicating with them via IP and not URLs.

        This would be a reason that a trusted app connects to tracking servers to update their internal filterlist.

        This “known to collect” seems to be unrelated to the actual connection, just “this service often collects data about x”.

        If this is true, that is HIGHLY misleading and please update your post to explain that possibility.

  • ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.one
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    The VPN isn’t generating the requests. Other apps on your device are. Run a VPN for a while and look at data usage by app. I guarantee your VPN app will be the highest (all the other apps data gets funneled through the VPN).

  • viking@infosec.pub
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    How exactly are you using the duckduckgo app protection and a vpn simultaneously? DDG sets itself up as a local vpn to be able to track outgoing traffic, and Android doesn’t support concurrent connections. Or is that what adguard does in the background while not active?

    • ohwhatfollyisman@lemmy.worldOP
      link
      fedilink
      arrow-up
      0
      ·
      4 months ago

      would you have done this with the ad guard vpn deactivated but the app still running in the background?

      I’ve been using the app for a few montha now and it’s only today that it got flagged in the DDG report. it’s not shown up before.

      • N0x0n@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        4 months ago

        Hey I gave it a second try with another tool: PCAPdroid and I’m not sure what I’m looking at … Adguard VPN seems effectively to send a lot of traffic to strange DNS requests…

        Just by opening the app and loggin in a fake account I got over 200 requests…

        I’m not an expert but those requests seem sketchy !!!

    • suppenloeffel@feddit.de
      link
      fedilink
      arrow-up
      0
      ·
      4 months ago

      This is something I’ve not understood yet. If you rent a server somewhere to use as a private VPN endpoint, your clear IP will be pretty much the only one connecting to the server. Correlating your traffic and your clear IP to your masked IP is easy for sufficiently motivated, able actors.

      Meanwhile, the main benefit of a shared VPN such as Mullvad is that many users simultaneously use the same endpoint, making it much harder to identify the user (taking only IP and traffic into account), provided they don’t log your traffic.

      So while having control over your endpoint is nice, how does that actually contribute anything meaningful to your privacy?

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Mullvad knows exactly who is connecting, when they are connecting and where they are located. If you have payment information on file they also know your name and your credit card.

        They can claim to somehow be “log free” but you can’t trust one who says they are going to not do something. Even if they aren’t abusing your data someone could of compromised them. Its not a good idea to place trust where you don’t have control.

        • suppenloeffel@feddit.de
          link
          fedilink
          arrow-up
          0
          ·
          4 months ago

          Mullvad certifiably doesn’t log. Their VPN infrastructure even transitioned to RAM-only a few months back. They’ve been raided by the police and nothing was confiscated because there was nothing to confiscate. Obviously they have a list of registered accounts and payments, but without any connection to - well, connections.

          I get what you mean though and mostly agree: There are only a few providers I trust enough to shift said trust from the ISP to them.

          As mentioned in the comment you replied to: Yes, trusting a third party is a compromise. But you are also trusting a third party when renting a server for a private VPN endpoint, as well. A third party provider with probably a lot more logging going on than a trusted service such as Mullvad. While being way more exposed.

          Since TOR isn’t feasible for most users 24/7, trusted commercial VPNs are the next best thing when the alternative is your ISP logging everything you do.

          • Possibly linux@lemmy.zip
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            1
            ·
            4 months ago

            I disagree. You don’t control Mullvad VPN so you don’t control how the servers work. There is nothing Mullvad can do to change a fundamental property of the internet. They are no worse or better than your ISP. You shouldn’t use device provided by your ISP and using a VPN gives a company insight and sometimes control of your machine. You should use your own device on your own network. From there setup encrypted DNS and lock down your network.

            • suppenloeffel@feddit.de
              link
              fedilink
              arrow-up
              1
              ·
              4 months ago

              What? So your advice for improving privacy is to not use a VPN, because the provider may log stuff and instead keep accessing stuff directly through your ISP who will log everything you do and simply use DNS over HTTPS/TLS, which does pretty much nothing for your privacy since your ISP still sees the servers you connect to?

              That’s terrible advice.