Protect your Android phone from surveillance for dummies and professionals

Teacher

Professional
Messages
2,670
Reaction score
806
Points
113
d7ea99a6-bf90-4733-9467-738012e3214d.jpeg


I haven't reminded you in a long time that security is a bitch's business. Let me remind you now. Today we will focus on strengthening our own network protection. And more specifically-smartphones based on Android.

Go:

Protecting your Android phone remotely is a difficult task. Rooting a phone is usually problematic, and it is not safe when it comes to ordinary users. We will also talk about the consequences of Root in terms of security in the article "Security of a rooted smartphone".

Therefore, my choice of advanced users falls on a free firewall, which does not require root rights to work. By the way, until a couple of years ago, there was no firewall for Android that did not require root rights.

Firewall for Android without Root

A few words about the terms used in this article.

In human language, about what a Firewall is:

A firewall is a program that allows you to filter all outgoing and incoming traffic.

Traffic is data that passes over networks from a computer or smartphone to a site, or between them.

Firewall without Root: Installation

First, let's download the app. You can download Firewall without Root for free using this direct link from Google Play.

After you click on the link, the app page opens. As you can see, the app's rating is 4.4. A rare app on market can boast such a rating.

Click on the "Install" button.

The fact that the app doesn't require any special permissions is also very encouraging, and this is not a very good sign.

Click on the "Accept" button.

After the app is downloaded and installed, click on the"Open" button

The app is installed. You can launch the app by clicking on the "Open" button, but it is better to close all windows and overload the device.

Firewall without Root: Setting up

After rebooting, we will see a window like this. Where we are asked to launch the app. Before launching, I recommend checking the box "Automatically enable..."

After starting, a system warning window will appear. We read it and feel free to click on "OK". I'll explain what this means later.

Second one after the "tab Home", in which we launched the application, is the "Home" tab. Waiting for access". On this tab, you can see all the apps that are trying to connect from your device somewhere. Why somewhere? Because each application connects and sends information to different servers.

Every time a new or installed application that does not have a previously created rule in our application tries to send information or tries to connect to remote servers, you will see an alert on this tab.

Now it's up to you to decide whether, for example, the Chrome browser will work or not. What you consider to be trusted — allow, what is not-prohibit. Anything that you don't think should have access to the Internet should be disabled. For example, if you don't use the camera, then feel free to turn it off. Or for example, an album of photos, a music player, all these applications have nothing to look for on the Internet, so feel free to prohibit it.

If you are seriously puzzled by the anonymity of your mobile devices, then I recommend reading our article "Android Anonymity"

On the "tab Programs", you can see all installed applications and rules for them. There are two empty fields (squares) next to each app.
  • The first is network access via WiFi.
  • The second square shows access via a mobile network.

By clicking on each of them, the user can set settings. Enable or disable network access. You can block a particular app selectively. To save traffic, you can, for example, block YouTube or another gluttonous app by checking the ban only for the Wi-Fi field. This can be a very useful feature in terms of saving traffic.

The "tab Global Rules" suggests manually blocking a particular resource by IP or name. It can also be some website or some left-wing Chinese server, which Chinese non-name smartphones and tablets so often knock on (leak information).

Well, the last tab "Event Log". Here you can see everything that is currently happening on the network. All applications that interact with the network in real time. Looking here, you will be surprised when you see that your phone is constantly sending something somewhere.

The program marks all allowed apps in green, and all blocked apps in red. It also provides information about the remote IP address and the exact time of the event.

Firewall without Root: Use

Cyberstalkers, the Firewall without Root described in this article is an application that must be installed on your Android device, smartphone and/or tablet. Especially if you're going to make money online.

From now on, it's up to you to decide what's in your phone, where and when it connects, what it merges, and what it downloads. The method described in the article does not provide a one-hundred-percent guarantee, but it significantly improves the protection of the phone.

That's all. Stay tuned. Then it will be even more interesting.
 
Top