I have read a blog post, where you can build your own privacy proxy server built on Raspberry PI. The post got me thinking about how I can use this to protect my privacy on my Android phone, and also get rid of those annoying ads.
Since I own a Samsung Galaxy S3 LTE with Android 4.3 (with a HW based Knox counter), rooting the phone now means you break Knox, and loose warranty. Past the point of no return ...
This means I have to solve this without root. Luckily newer Androids support VPN without rooting, but setting a mandatory system-wide proxy is still not possible without root.
But thanks to some iptables magic and Privoxy, this is not a problem anymore :)
The ingredients to build your own privacy protection proxy:
- One (or more) cheap VPS server(s)
- a decent VPN program
- Privoxy
- iptables
VPS server
To get the cheap VPS server, I recommend using Amazon EC2, but choose whatever you like. The micro instance is very cheap (or even free), and has totally enough resources for this task. I'm using the Ubuntu free tier now and it works like a charm. And last but not least Amazon has two-factor authentication! You can set up an Ubuntu server under 10 minutes. Use the AWS region nearest to you, e.g. I choose EU - Ireland.
For the VPN program, I recommend the free version of the OpenVPN AS (EDIT: be sure to use OpenVPN AS 2.0.6 or later, both on the server and the client). Easy to set-up quick start guide is here, GUI based configuration, and one-click client installer for Android, iOS, Windows, Linux, OSX. The Ubuntu installer packages are here.
The most important settings:
- I prefer to use the TCP 443 and UDP 53 ports for my OpenVPN setup, and let the user guess why.
- For good performance, UDP is preferred over TCP.
- VPN mode is Layer 3 (routing/NAT).
- Don't forget to allow the configured VPN ports in the AWS firewall (security groups).
Other VPN settings:
- Should VPN clients have access to private subnets (non-public networks on the server side)? - Yes
- Should client Internet traffic be routed through the VPN? - Yes
Privoxy
The next component we have to install and configure is Privoxy. As usual, "apt-get install privoxy" just works. The next step is to configure privoxy via /etc/privoxy/config file, there are two options to change:- listen-address your.ip.add.ress:8118
- accept-intercepted-requests 1
Beware not to allow everyone accessing your Privoxy server in the AWS EC2 security groups, be sure it is reachable only to VPN users!
After everything is set, start privoxy with "service privoxy start", and add it to the autostart "update-rc.d privoxy defaults".
After everything is set, start privoxy with "service privoxy start", and add it to the autostart "update-rc.d privoxy defaults".
Iptables
And the final step is to configure your iptables chain to forward every web traffic from the VPN clients to the Privoxy server:
iptables -t nat -A PREROUTING -s 5.5.0.0/16 -p tcp -m multiport --dports 80,8080,81 -j DNAT --to-destination your.ip.add.ress:8118
Optionally you can block access to all other ports as well, and what does not go through your Privoxy won't be reachable.
Based on your Linux distribution and preference, you might make this rule persistent.
Final test
Now you can connect to the VPN server from your Android device.
After connecting, the final results can be seen in the following screenshots. And yes, there is a reason I chose Angry Birds as an example.
After logging in from a client, you get the following nice packages to install on your device:
![]() |
Angry Birds without Privoxy |
![]() |
Angry Birds with Privoxy |
![]() |
Stupid flashlight app with ad |
![]() |
Stupid flashlight app with Privoxy |
Spoiler alert
If you are afraid of NSA tracking you, this post is not for you. If you want to achieve IP layer anonymity, this post is not for you. As long as you are the only one using that service, it should be trivial to see what could possibly go wrong with that.
Known issues
Whenever the Internet connection (Wifi, 3G) drops, the VPN connection drops as well, and your privacy is gone ...
Sites breaking your privacy through SSL can still do that as long as the domain is not in the Privoxy blacklist.
Additional recommendation
If you are using OSX or Windows, I can recommend Aviator to be used as your default browser. It is just great, give it a try!
PS: There are also some adblock apps removed from the official store which can block some ads, but you have to configure a proxy for every WiFi connection you use, and it is not working over 3G.
- Nsa Hack Tools
- Underground Hacker Sites
- Hacking Tools Mac
- Beginner Hacker Tools
- Wifi Hacker Tools For Windows
- Nsa Hack Tools Download
- Pentest Tools For Mac
- Pentest Automation Tools
- Hacking Tools For Mac
- New Hack Tools
- Hacking Tools Github
- Pentest Tools Windows
- Pentest Tools Nmap
- Best Hacking Tools 2019
- Black Hat Hacker Tools
- Kik Hack Tools
- Pentest Tools Github
- Hack Rom Tools
- Hack Tools
- Blackhat Hacker Tools
- Hacker Tools Software
- Pentest Tools Android
- What Are Hacking Tools
- Wifi Hacker Tools For Windows
- Tools For Hacker
- Best Pentesting Tools 2018
- Hacking Tools Online
- Blackhat Hacker Tools
- Pentest Tools Website Vulnerability
- Hacker Security Tools
- Pentest Tools Github
- Install Pentest Tools Ubuntu
- Pentest Tools List
- Pentest Tools
- Best Pentesting Tools 2018
- Hack Tools Download
- Kik Hack Tools
- Hack Tools
- Hacking Tools
- Nsa Hack Tools
- Pentest Tools Linux
- Github Hacking Tools
- Underground Hacker Sites
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Windows
- Computer Hacker
- Hacker Tool Kit
- Hacking Tools For Windows
- Pentest Tools Download
- Usb Pentest Tools
- Hak5 Tools
- Hacker Tools Hardware
- Pentest Reporting Tools
- Hack Tools Mac
- Pentest Tools Android
- Hacking Tools 2020
- Hacking Tools For Windows
- Blackhat Hacker Tools
- Pentest Tools Subdomain
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Tcp Port Scanner
- Pentest Tools Port Scanner
- Black Hat Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Usb
- Wifi Hacker Tools For Windows
- Nsa Hack Tools Download
- Hack Tools Pc
- Kik Hack Tools
- Best Hacking Tools 2019
- Usb Pentest Tools
- Hacking Tools Github
- Pentest Tools Website Vulnerability
- Growth Hacker Tools
- Hack And Tools
- Hacking Tools For Beginners
- Hacker Tools Mac
- What Is Hacking Tools
- Hacking Tools
- Hacker Tools Linux
- Hacker Tools For Mac
- Hack Tools For Pc
- Top Pentest Tools
- Pentest Tools Framework
- Hack Tools Mac
- Hacker Tools Software
- Hacking Tools For Beginners
- Hacker Tools List
- Hak5 Tools
- Hacker Hardware Tools
- Hacking Tools Usb
- Hacker Tools For Ios
- Hacking Tools Usb
- Pentest Box Tools Download
- Free Pentest Tools For Windows
- Pentest Box Tools Download
- Github Hacking Tools
- Hacker Tools 2020
- Hacking Tools For Windows
- Hack Tools Mac
- Hacker Search Tools
- Pentest Tools For Ubuntu
- Hack Tools
- Pentest Tools Apk
- Hacker Tools Free Download
- Pentest Tools Free
- Pentest Tools Free
- Hack Website Online Tool
- Hacking Apps
- Hack Apps
- Computer Hacker
- Hacking App
- Best Hacking Tools 2020
- Hack App
- Hacking Tools Windows
- Pentest Tools Tcp Port Scanner
- Hacker Tools Linux
- Black Hat Hacker Tools
- Hack Tools Github
- Hacker Tools
- Hacker Search Tools
- Physical Pentest Tools
- Pentest Tools Nmap
- Pentest Tools List
- Hack App
- Pentest Tools Linux
- Hack Apps
- Hack Tools Pc
- Hacking Apps
- Underground Hacker Sites
- Hack Tools For Ubuntu
- Hacking Tools And Software
- Hack Tools For Games
- Hak5 Tools
- Hacker Tools Apk Download
- Hack Tools Github
- Hacking Tools For Mac
- Black Hat Hacker Tools
- Bluetooth Hacking Tools Kali
- Hack Tools For Ubuntu
- Hacking Tools Free Download
- Blackhat Hacker Tools
- Best Hacking Tools 2020
- How To Make Hacking Tools
- Hackers Toolbox
- Hack Rom Tools
- Pentest Tools Website
- Pentest Tools For Windows
- Pentest Tools Online
- Top Pentest Tools
- Hack Tools
- Hacking Tools 2020
- Hack And Tools
- Hacking Tools Mac
- Hacker Tools 2020
- Hacking Tools Hardware
- Top Pentest Tools
- How To Make Hacking Tools
- Underground Hacker Sites
- Hacking Tools Pc
No hay comentarios:
Publicar un comentario