CallShield is a call blocker for android.
A call is blocked if de the caller id starts with any number included in the block list.
This behavior could be changed in general preferences for doing an exact matching.
For adding a number to block list, first you need to include it in your contacts.
A blocked calls log is saved and a notification is showed when a call block ocurrs.
Xposed can be user for earlier block.
repo.xposed.info/module/com.gomez.callshield
gitlab.com/jgora/CallShield
This software is provided "as is", without any kind of warranty.
Use at your own risk.
The MIT License (MIT)
Copyright (c) 2017 jgora
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Can you detail the permission requirements?
Also maybe what's the difference from existing modules? And can you choose to hide notifications for blocked calls?
Thanks for this, at any case.
Can block private numbers, for free
android.permission.READ_CONTACTS for adding numbers to block list
android.permission.READ_PHONE_STATE and android.permission.CALL_PHONE for blocking calls in non-xposed blocking mode
android.permission.RECEIVE_BOOT_COMPLETED for starting service at device boot
android.permission.WRITE_EXTERNAL_STORAGE and android.permission.READ_EXTERNAL_STORAGE, maybe not necessary
@jgora
Could you please add an option to block all incoming calls?
halfbytecode said:
@jgora
Could you please add an option to block all incoming calls?
Click to expand...
Click to collapse
Try this version and let me know https://gitlab.com/jgora/CallShield...338fe1a349431ac/CallShield-1.0.34-release.apk
I'm not able to find the jks used for signing the apk, so you must uninstall the previous one and then install this new version.
When I find the jks, will upload the new module version to xposed repo.
@jgora
Great app. Could you please add an option to block unknown numbers (block any number not in your contacts list. like a whitelist) ?
neckoONE said:
@jgora
Great app. Could you please add an option to block unknown numbers (block any number not in your contacts list. like a whitelist) ?
Click to expand...
Click to collapse
Hi @neckoONE
A "Whitelis mode" option has been added to preferences.
Try this version and let me know https://gitlab.com/jgora/CallShield...26c3f73c74194e1/CallShield-1.0.35-release.apk
Hi @jgora
The version works great thanks
jgora said:
Hi @neckoONE
A "Whitelis mode" option has been added to preferences.
Try this version and let me know https://gitlab.com/jgora/CallShield...26c3f73c74194e1/CallShield-1.0.35-release.apk
Click to expand...
Click to collapse
Hi,mate. I can install v1.0.35 version on my phone of meizu M5. every time I got "Signature certificate not found",but I can install v1.0.33. how can I fix this issue.thanks a lot.
Eric_cn said:
Hi,mate. I can install v1.0.35 version on my phone of meizu M5. every time I got "Signature certificate not found",but I can install v1.0.33. how can I fix this issue.thanks a lot.
Click to expand...
Click to collapse
Are you trying to install the new version over the old? If so you missed the post and/or the module's version info about the signature issue.
Moto G5S Plus XT1806, OmniROM 8.1.0, microG (NoGapps), MultiROM, XDA Legacy
This module seems to work great so far! Unfortunately, the "Call Blocked" notifications are really annoying. Is there a way to suppress them? I've tried using 3rd party apps to block the notifications but none of them are working. Even setting the Notification options to "Blocked" using the system App Info settings won't block them. It just occurred to me that these notifications are actually coming from the Phone app, not the CallShield app... still, I hope I can find a way to get rid of them.
vertigoelectric said:
This module seems to work great so far! Unfortunately, the "Call Blocked" notifications are really annoying. Is there a way to suppress them? I've tried using 3rd party apps to block the notifications but none of them are working. Even setting the Notification options to "Blocked" using the system App Info settings won't block them. It just occurred to me that these notifications are actually coming from the Phone app, not the CallShield app... still, I hope I can find a way to get rid of them.
Click to expand...
Click to collapse
It is Callshield who is showing that notification, from the xposed hook of Phone app. I will add a "Silent mode" option to Callshield for not showing that "annoying" notifications.
@vertigoelectric Try 1.0.38 version with "Silent mode" option and let me know
Whitelist not working
I have an older phone (Galaxy S4 with android 5.0.1) and the "whiltelist" mode blocks all calls even if they are in my contacts list. Any way to get this to work? I was using RCB (root call blocker) but that stops working with xposed being installed.
creatorsal said:
I have an older phone (Galaxy S4 with android 5.0.1) and the "whiltelist" mode blocks all calls even if they are in my contacts list. Any way to get this to work? I was using RCB (root call blocker) but that stops working with xposed being installed.
Click to expand...
Click to collapse
Verify that "Global lock" option is not selected.
Maybe your contacts are saved with country prefix?
Is it possible to introduce the possibility of blocking calls only on certain days of the week and at certain times?
fede91it said:
Is it possible to introduce the possibility of blocking calls only on certain days of the week and at certain times?
Click to expand...
Click to collapse
I will try to include Tasker/Locale/Llama integration for activating it in whatever condition someone would need.
Haven't tried it yet, but couldn't find any info about regex matching. Regex match would be quite useful
bahtsiz_bedevi said:
Haven't tried it yet, but couldn't find any info about regex matching. Regex match would be quite useful
Click to expand...
Click to collapse
It's working with starts-with pattern, so every call with starting with that prefix included in block list, will be blocked
This behavior can be disabled with Exact matching option.
Why is there a service constantly running when I am using the xposed method to block the calls? This is nice, I wish the source was released so I can make it better, but I don't understand why there needs to be a service running when xposed is enabled....
Related
Most of the app now require acces to the phone calls..even a news app requires it, sms app such as go sms also requires it. So I want to know after knowing that an app will be able to acces your phone call you still download it? And does anyone in what way the developers use such info?
Sent from my E10i using XDA App
Excellent topic, I'm really troubled by this. The business world makes a whole lot of money based on the average persons inertia - their lack of information or willingness when it comes to the products and services they use and the money they use to pay for them. Particular mobile phone network providers come to mind, who are happy to charge the most expensive prices because people don't know or don't care.
This lazy attitude is seeping into the Android app world. It will be a small per centage of us who will realize this threat and do something about it - exactly like cookies and public wifi privacy etc.
For those of us already interested, are there websites or apps which can guide us on this?
I had thought about it before but it seemed to be all apps out there at least need to access your internet, calls, phonebook and etc.. Not sure really if some of these nasty apps has the evil purpose to steal our vital informations in the phone... say if we're checking our bank account or something similar..
What I practice:
1) Installed AVG pro and do scan regularly, and set to scan every newly installed apps.
2) Use both cache cleaner and history eraser to clean up all traces once a day.
3) Hope they don't see me as a target.
Don't worry.
I think access to the phone calls is just to minimize the running app in case you receive a call. In other case you would not even realize an incoming call?!
Deehee3 said:
Don't worry.
I think access to the phone calls is just to minimize the running app in case you receive a call. In other case you would not even realize an incoming call?!
Click to expand...
Click to collapse
What about data? When you install an app in most cases you allow data access to it.
Searching for updates or viewing developers homepage maybe?
Sent from my U20i using XDA App
Deehee3 said:
Searching for updates or viewing developers homepage maybe?
Sent from my U20i using XDA App
Click to expand...
Click to collapse
What if not? What if app you´ve installed is spying on you and sending info to hackers. How would you know?
On android we have the luck that there are a lot of applications that are open source. When I have to choose an application, I always choose and support the open projects!
You will notice that most of those applications don't need all that personal information! Makes you wonder...
On other systems, apps usually have an user/administrator scheme, where the 'user' has access to some things and 'administrator' has access to everything.
There is no such thing on Android (except if you have a rooted phone and some app asks for superuser access, but you get a requester asking for permissions as well).
Each app has to specifically ask for permissions or the system will deny it. A spyware has to ask for those permissions or it won't work.
Some permission requests to look out for:
- "Call phone"
can be used by the application to silently dial some "premium" numbers
- "Send SMS"
can be used to send SMS to special "premium" numbers
- "Record phone calls"
can be harmful if associated with "internet access" permission
- "Access fine location"/"access coarse location" and "internet access"
can be used for tracking purposes
Many apps ask for:
- "Phone identity" / "internet access"
they use it for "statistics purposes" (flurry.com mostly) but it is bad. The developer should always inform the user about those.
BTW, that an app is open source makes no difference. Someone can always (willingly or not) tamper with the final build. And not everyone reviews open source apps.
zapek666 said:
A spyware has to ask for those permissions or it won't work.
Click to expand...
Click to collapse
Sure. But if an app legitimately ask for data transmission and file system access, AND you grant it, how would you know it is not using the granted rights for something else?
ppirate said:
On android we have the luck that there are a lot of applications that are open source. When I have to choose an application, I always choose and support the open projects!
You will notice that most of those applications don't need all that personal information! Makes you wonder...
Click to expand...
Click to collapse
Don´t tell me that you evaluate the source code of each application you load from the market. And even so, how would you know the difference between what is shown to you and the final build, available on the market?
vlissine said:
Sure. But if an app legitimately ask for data transmission and file system access, AND you grant it, how would you know it is not using the granted rights for something else?
Click to expand...
Click to collapse
Filesystem access are limited to the external memory card. An app with such permission cannot access other apps' private data (which are stored on the phone).
Android apps are all sandboxed into their own homes.
A good example of a suspicious application is HTML5 Reference.
"This HTML5 reference lists all tags supported in the HTML5 specification.", fine. Let's look at the permissions:
Network communication: full Internet access
Phone calls: read phone state and identity
While the first 2 could be produced as a side effect of the developer implementing some "statistics library" (flurry.com or so), the next 2:
Your location: fine (GPS) location
Your personal information: read sensitive log data
Are a giveaway that this app does a bit more than just listing HTML reference tags
zapek666 said:
Filesystem access are limited to the external memory card. An app with such permission cannot access other apps' private data (which are stored on the phone).
Click to expand...
Click to collapse
Ok, how about a picture viewer, which usually picks pictures from each and every
directory, no matter if you want it (and not only from memory card).
Hey vlissine and zapek666. You both have a point.
One individual cannot review every code he or she uses. And also one does not only uses his or her own builds of the projects. But every now and then, I have to go into a project, mostly to add functionality. During that time, I usually have to go over a lot of code to understand the program. It is no guarantee, but you can imagine that some strange code will stand out.
I'm surely not the only person. So while one individual is not capable of such an endeavor. A lot are.
Your other point is as valid as can be. But here again, builds are comparable.
Surely, one does not have to find himself or herself obliged to use certain kind of projects. But to me, when I have the change, I use and support the open source project. One important reason is because of the concern raised by the original poster!
http://googlemobile.blogspot.com/2011/03/update-on-android-market-security.html
Apparently we were not that paranoid, thinking of spying apps
Two options:
1) To avoid being spy and get super paranoid about it... ditch your smartphone and get those early 2000 phones with only calls and sms capable.
2) Use the smart phone eg: X10 mini/pro or any android phones and ignore these spying scene and live with it like nothing ever going to happen since this new technologies really live up our life nowadays..
farsight73 said:
Two options:
1) To avoid being spy and get super paranoid about it... ditch your smartphone and get those early 2000 phones with only calls and sms capable.
2) Use the smart phone eg: X10 mini/pro or any android phones and ignore these spying scene and live with it like nothing ever going to happen since this new technologies really live up our life nowadays..
Click to expand...
Click to collapse
One more option - stop giving stupid advises when you have nothing to say.
maybe apps need to call functions or need it to run?
write them your self if your that bothered?
...
Sent from my E10i using the XDA mobile application powered by Tapatalk
PeerBlock is now available in the Google Play Store! https://play.google.com/store/apps/details?id=com.peerblock_new
For anyone who is having the first version of PeerBlock For Android, I lost my certificate key by accident and was not able to update the first one I've uploaded.
Please install this version if you want it more updated with a lot of bug fixes.
Some features might not work yet as it's still Work in Progress but the basic functionality is working.
PeerBlock For Android lets you control who your phone 'talks to' on the Internet.
By selecting appropriate lists of 'known bad' computers, you can block communication with advertising or spyware oriented servers,
computers monitoring your p2p activities, computers which have been 'hacked', even entire countries!
They can't get in to your phone, and your phone won't try to send them anything either.
And best of all, it's free!
Keep in mind that I'm not a member of the PeerBlock team, I just wanted PeerBlock for phone
You're able to grab the lists from iblocklist.com so you can start blocking those evil hosts
To add lists to PeerBlock create a new directory in the root of the sdcard (not external sdcard)
Called 'PeerBlockLists' here should be all the text files
Everytime you added a new/updated list to your PeerBlockLists please press the 'Rebuild cache blocklist' and reboot so that new hosts can be blocked
Running a Firewall? or no internet ?
Be sure you enable Input Chains and WiFi rules for PeerBlock for Android even if PeerBlock for Android does not use the internet or WiFi.
The internet permission is being used to inter process communication with the apps and service to see if a connection should be allowed or blocked.
WARNING:
Root is required for XPosed to be installed
Use at your own risk!
WORK IN PROGRESS. WILL EAT YOUR CAT.
Features:
Block million of hosts (upto billions)
Add unlimited amount of block lists
Allow HTTP/HTTPS Traffic when PeerBlock is enabled, this will make a security hole though so better if u keep it off
Block All Traffic (Paranoid Mode) every single application in android will not have internet
Block DNS - Block DNS Requests
Block the 'Ad' Keyword in host names to give a better success rate for blocking ad's
Have a history list of every application that connected to a host
Block a hostname/subnet/ip address from the history
No internet leaks at startup!
Show a notification when a connection is being blocked.
Show a notification when a new connection is being established.
If people wonder if this also works for the Galaxy Note3... yes it does I'm having one myself
How To use
1. Install XPosed Framework
2. Install PeerBlock For Android
3. Create a directory in the sdcard called "PeerBlock"
3. Create a directory in the PeerBlock directory a directory called called "PeerBlockLists"
4. Go into XPosed Framework Installer and enable "PeerBlock For Android"
5. Reboot your device
6. Now go to the website iblocklist.com
7. Take any list you wish for example, http://www.iblocklist.com/list.php?list=bt_ads
8. Press the Update button to download the list (or copy the Update URL into your browser to download it)
9. Now simply copy/paste the .txt file into the sdcard in the folder PeerBlockLists
10. Go to the main menu and hit the "Rebuild cache blocklist" button
11. Reboot your device and enjoy
New features in 1.04:
PeerBlock For Android is now using a Service to have it more stable and if the service is not running no app can communicate with the outside world.
More stability
Re-designed UI
Strange behaviour is fixed which people noticed
Quite a few bug fixes which people reported
Fixed most app crashes
Designed my own database format
Less format errors in rebuilding the cache list
@DragonHunt3r can we get gingerbread support plz?
It seems old problems still there : block ad hosts button still unchecked for example.
I cannot add a list thé button does nothing ?
Sent from my SM-N9005 using XDA Premium 4 mobile app
Wow this looks huge many thanks! Does anyone know if this plays nice with AdAway installed or should this be a direct replacement for AdAway?
lmike6453 said:
Wow this looks huge many thanks! Does anyone know if this plays nice with AdAway installed or should this be a direct replacement for AdAway?
Click to expand...
Click to collapse
You can replace AdAway with this or keep it side by side, it's your call really as AdAway is using the Hosts file and PeerBlock For Android is not using the hosts file
bournaze said:
It seems old problems still there : block ad hosts button still unchecked for example.
I cannot add a list thé button does nothing ?
Sent from my SM-N9005 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
Same here, and if I select the 'Rebuild cache blocklist', all it seems to do is lock up the program.
Also, no mention on the YOLO test server being removed or not.
Hey there! What's happened? no play store, no apk, no xposed repo... no nothing... ?!
Conte Mascetti said:
Hey there! What's happened? no play store, no apk, no xposed repo... no nothing... ?!
Click to expand...
Click to collapse
Does anyone know of an alternative app to peerblock?
Since we just get ignored by the developer, and mysterious connections are constantly being made from the program.
xT29c said:
Does anyone know of an alternative app to peerblock?
Since we just get ignored by the developer, and mysterious connections are constantly being made from the program.
Click to expand...
Click to collapse
alt for PeerBlock - UnbelovedHosts
yespda2 said:
alt for PeerBlock - UnbelovedHosts
Click to expand...
Click to collapse
Thanks! I'll be using that until/if PeerBlock gets officially released to android.
Lost a user dragonhunter.
Welcome Back
DragonHunt3r said:
PeerBlock is now available in the Google Play Store! https://play.google.com/store/apps/details?id=com.peerblock_new
For anyone who is having the first version of PeerBlock For Android, I lost my certificate key by accident and was not able to update the first one I've uploaded.
Please install this version if you want it more updated with a lot of bug fixes.
Some features might not work yet as it's still Work in Progress but the basic functionality is working.
Click to expand...
Click to collapse
Hi Friend, where have you been? Long time no see on xda....I must say you were missed I know many fellas were disturbed with your app....so much so that they got old thread locked....but if it gives you any satisfaction I have been always using your app....though I missed your to do list....which I am sure now that you are back.....you can work upon
HTML:
Todo's
Check if UDP is getting blocked
Remove space used by Ad's
Add MAC-Address filter white/black lists
Show notifications (if enabled)
Making the Ip Range check multi-core
Create a blacklist/whitelist for apps to allow internet
Blocklist updater/downloader
Create a whitelist for hosts/Ip Addresses
Root-Mode with IpTables (I will not remove XPosed from the project)
Remove host from blocked hosts
A popup window which shows allow/deny for establishing a connection
that YOLO problem is yes definitely there...can you please remove....though I understand that your app wasn't using any permission even if it would I had DMZs (double checks) in place to get rid of any unwanted outgoing requests....even for PeerBlock....anyways back to the point....Your to do list was great....you should complete that :good:
Also, ask forum moderator to unlock that original thread as you are back in business
can you please post the link?
godofgeeks said:
Hi Friend, where have you been? Long time no see on xda....I must say you were missed I know many fellas were disturbed with your app....so much so that they got old thread locked....but if it gives you any satisfaction I have been always using your app....though I missed your to do list....which I am sure now that you are back.....you can work upon
......
Also, ask forum moderator to unlock that original thread as you are back in business
Click to expand...
Click to collapse
wow, could you cuddle Dragonhunter's balls any tighter?
This is the reborn version of Adblocker, which helps you block advertisements from various Ad-Network.
It can block advertisements in many aspects according to a pre-loaded-list, such as activities, views, hosts-based, webview-based, receivers and many many more.
It does not affect system hosts file, and does not conflict with it either. It also has whitelist feature so you can easily control it. You can also use it along with AdAway or other adblockers to extend its power, especially built-in app ads.
This module is being actively developed, and I will update it about every ten days. If you have any issues or want to contribute to the project, feel free to contact me via Github or XDA.
MOD EDIT
Numerous reports from users of certain devices that this module can disable things, cause erratic behaviour and other issues, have been reported.
Specifically, most of these seem to be related to users of Xiaomi's Mi-line of devices. In the case of these devices, the module can cause behaviour such as stopping the launcher and removing some options from settings, making the module difficult to remove.
Proceed with your own caution, and preferably a backup to restore if you encounter such erratic behaviours. This will also be posted in the OP of the thread.
There are varying alternatives that work well. This module has also NOT been updated at all lately, and it's recommended that users seek alternatives.
Download:
http://repo.xposed.info/module/com.aviraxp.adblocker.continued
Features:
- Activityies Block
- Views Block
- Hosts Block (Not affect system hosts file)
- WebView Block
- Services Block
- Receivers Block
- .............
Principle of Work:
I hook some fundamental classes and methods of Android system, check if they are included in a pre-loaded-list (maintained by me), and break the calling of these classes and methods if included. There might be some false positives so feel free to contact me.
FAQs:
- How does it work compared to AdAway and MinMinGuard?
AdAway modifies system hosts file to redirect some ad servers to local host, thus prevent from accessing them. MinMinGuard blocks some prebuilt app Ad providers from taking effect. My application have both of their features, and extends by blocking services and receivers.
- Where is the hosts' source?
Now, it covers Dan Pollock's hosts and some app specific blocking hosts. I am searching for good sources which is simple and effective. If you have some suggestions, feel free to let me know.
- Why does not it take effects to some browsers?
The reason is basically the same as unbeloved hosts. Some browsers have their own network solutions which conflict with the normal handling method. But for browsers which simply use original WebView loading method it works well.
- There are some false positives!
Contact me via Github or here. You can also use the whitelist feature. For element whitelist, just enable debug logging, find the element(activities, hosts, views...) according to a 'block success' line, and add them to the whitelist. Each element takes one line.
- I need to view ads for some reason.
Use the whitelist feature. However, some apps uses Android System WebView as an elements loader, so you should whitelist it too. But this will ramp down the power of blocking. I am working on a better whitelist feature.
- I want to donate to you for your work.
Use the PayPal donation option:https://www.paypal.me/wanghan1995315. But it will not make any difference or be a privilege for you. There is no such thing as advanced support.
- How can I contribute to you if I found something useful (hosts, Ad SDKs)?
I am working on a block list repo on Github. Feel free to open a pull request.
XDA:DevDB Information
AdBlocker Reborn, Xposed for all devices (see above for details)
Contributors
aviraxp
Source Code: https://github.com/aviraxp/AdBlocker_Reborn
Xposed Package Name: com.aviraxp.adblocker.continued
Version Information
Status: Stable
Current Stable Version: 1.5.1
Stable Release Date: 2017-03-13
Created 2017-02-11
Last Updated 2017-04-18
CHANGE LOG:
1.1.1:
- Fix an incremental bug which causes many false positives
- Add system apps protection
- Add shortcut block (all credits to apsun)
- Various Fixes
1.1:
- Add more builtin hosts
- Replace regular expression with Easylist rules to improve performance
- Tweak default preferences (Hiding is disabled and WebView Block is enabled)
- Introduce element whitelist
- Implement system framework apps protection
- Various fixes
1.0.2:
- Implement aggressive block toggle
- Add XDA link and PayPal donation
- Improve blocking effect by importing blacklist from AdScanner
- Address more false positives
Works flawlessly. Had some issues with MinMinGuard. I am currently using AdAway+Adblocker Reborn. Everything is perfect.
Version 1.0.2 has been updated. If you meet any issues feel free to contact me.
Sent from my OnePlus2 using XDA Labs
works perfect atm,thanks
works as expected. great
Thank you for your work. Could anyone confirm if this module impact (negatively) battery duration ?
IgorMarinho said:
Thank you for your work. Could anyone confirm if this module impact (negatively) battery duration ?
Click to expand...
Click to collapse
From my personal experience, it does not have any evident effect on battery. But to be honest, every exposed module will affect battery since the phone now has more work to do, which is implemented by the module. I will keep the battery consumption as low as possible.
Sent from my OnePlus2 using XDA Labs
Uhm what exactly is the reason I should use this. I just tested a website for adblock check, whereas adaway active lead to first pic.
Disable adblock and enable this tool and restart lead to the second one. So obviously the ad had not been blocked by this mod.
Is your mod for ads in games or how should i understand that?
Just a bit confused, sry
Awesome module
What can this xposed module/app do that THIS APP can't? Just curious, thanks!
@aviraxp thanks a ton!! Obviously does the trick especially when it comes to being redirected to a million other places then what I clicked on. In that sense, that is something that adway does not do no matter what host file/s I use as well as adguard and minminguard. There were a couple sites I just about swore off because it was impossible to do anything as far as a navigation goes but I can do as I like now thank you very much.
pieceofphil said:
Uhm what exactly is the reason I should use this. I just tested a website for adblock check, whereas adaway active lead to first pic.
Disable adblock and enable this tool and restart lead to the second one. So obviously the ad had not been blocked by this mod.
Is your mod for ads in games or how should i understand that?
Just a bit confused, sry
Click to expand...
Click to collapse
I guess you are using Opera, right? Opera has its own proxy solution and unfortunately it does not use the system web view, thus I cannot get it work with the same reason as UnbelovedHosts. I am still searching for more stable hooking methods.
Sent from my OnePlus2 using XDA Labs
@aviraxp Does this continuation of "pl.cinek.adblocker" ?
exodius48 said:
@aviraxp Does this continuation of "pl.cinek.adblocker" ?
Click to expand...
Click to collapse
Generally, yes. But his code only covers about 10% of this app. You can think this is a new app too.
Sent from my OnePlus2 using XDA Labs
aviraxp said:
Generally, yes. But his code only covers about 10% of this app. You can think this is a new app too.
Sent from my OnePlus2 using XDA Labs
Click to expand...
Click to collapse
Nice.
Just a feature request, hope this app can block all miui ads. :angel:
exodius48 said:
Nice.
Just a feature request, hope this app can block all miui ads. :angel:
Click to expand...
Click to collapse
Sadly I do not have xiaomi devices. For MIUI, you can use other tools like RootToolsNeo.
Sent from my OnePlus2 using XDA Labs
aviraxp said:
Sadly I do not have xiaomi devices. For MIUI, you can use other tools like RootToolsNeo.
Sent from my OnePlus2 using XDA Labs
Click to expand...
Click to collapse
Ah..ok, nevermind.
Just gave the module another go, still having the same issue.
I'm playing this game : Animation Throwdown the Quest for Cards, and i have minminguard installed and the game whitelisted, the game offers ads in exchange for some increased drop rates, and you have to click on the watch button for the ads to start, which in my setup works well.
When i install this module, activate, whitelist the game, reboot (exact steps), clicking the watch ads button in game does nothing, rebooting doesn't change anything.
Once i disable/remove the module and reboot i can run the ads again, haven't tried with other apps since i don't have any others with ads in them tbh.
ticktock666 said:
Just gave the module another go, still having the same issue.
I'm playing this game : Animation Throwdown the Quest for Cards, and i have minminguard installed and the game whitelisted, the game offers ads in exchange for some increased drop rates, and you have to click on the watch button for the ads to start, which in my setup works well.
When i install this module, activate, whitelist the game, reboot (exact steps), clicking the watch ads button in game does nothing, rebooting doesn't change anything.
Once i disable/remove the module and reboot i can run the ads again, haven't tried with other apps since i don't have any others with ads in them tbh.
Click to expand...
Click to collapse
I am addressing this issue, but I need more info. Does every time you click the ads it does nothing?
Sent from my OnePlus2 using XDA Labs
Hello there!
I use a Motorola Moto G6 that's running on Android 9 Pie (Build no. PPS29.118-11-1) and I was wondering if there was a way to block certain apps from being installed on my device by their package name. I want to be able to do this for the same reason I use very strict settings on Digital Wellbeing: self control.
I know that you can install and block apps and I know that you can use parental settings on your phone but that simply won't help in this situation. I'm also aware that an app with these capabilities might not be available. My question isn't if it's possible now or with the utilities currently provided through apps developed for my Android OS; I'm trying to figure out if it's possible to block apps by their Package Name in any way and if it's impossible to make (in theory) an app that can do it.
I'm not sure how it can be done. Can it be done by having an app that reads through an app that's attempting to be installed and generates bricked app directories where it should chuck out the app's resources so it can't be installed? Maybe. Can it be done by cancelling the installation request of an app that has a Package Name matching one inputted into a list on the hypothetical app in question? Not sure. If anyone knows the answer to those two proposals or has their own suggestions, please do your best to answer my post and keep in mind, this has to be done without the phone being rooted.
An additional but important factor: this is about self control. I can easily bring myself to not remove or otherwise disable restrictive measures on my phone, but I'd like to know if I can make it so that you cannot remove a Package Name that has been blocked in the phone no matter the method used in the first part (other than uninstalling the blocker app, of course).
Regards,
Yoki Aza
Hi,
Just joined a new company that requires Company Portal to access Outlook email and other apps on my phone.
Evidently even if you manage to hide root from Company Portal, a major requirement is having an encrypted device with Company Portal.
In order to get rooted 2 years ago, I ran Disable_Dm-Verity_ForceEncrypt during the TWRP setup process so my rooted V30 is not encrypted.
Is there any way to restore encryption now without losing my current stock rom settings and data and maintain root?
I see in LG Settings there is an option to Encrypt Phone and SD Card. Will this suffice so I can maintain root?
If not, is there a way to root and install a TWRP LG Pie Rom zip without disabling encryption via Disable_Dm-Verity_ForceEncrypt?
Or is it impossible to root and use Company Portal with the LG V30?
Thanks in advance!
Drew
drewcu said:
Hi,
Just joined a new company that requires Company Portal to access Outlook email and other apps on my phone.
Evidently even if you manage to hide root from Company Portal, a major requirement is having an encrypted device with Company Portal.
In order to get rooted 2 years ago, I ran Disable_Dm-Verity_ForceEncrypt during the TWRP setup process so my rooted V30 is not encrypted.
Is there any way to restore encryption now without losing my current stock rom settings and data and maintain root?
I see in LG Settings there is an option to Encrypt Phone and SD Card. Will this suffice so I can maintain root?
If not, is there a way to root and install a TWRP LG Pie Rom zip without disabling encryption via Disable_Dm-Verity_ForceEncrypt?
Or is it impossible to root and use Company Portal with the LG V30?
Thanks in advance!
Drew
Click to expand...
Click to collapse
My only solution to this problem was to always use webaccess for my Office365 account. They required the portal to use Outlook, and part of that requirement allowed them to wipe my phone whenever they wanted. It's my phone, so I guess I won't use their email on my phone.
Sounds like your company has yet another behind-the-times IT department (like mine). Although mine is also exceptionally incompetent. They left the IMAP server open and available to anyone, so I simply used that with my GMail account instead. It did require me to allow them admin access to the phone to wipe the device (though I think they can only wipe the email) but it worked. They finally got modern and are using 365 so now it doesn't need these extra things. You might want to see if you can wait until they wake up and/or see if there is a server you can connect to. I found mine because, due to their incompetence, they let iPhones use the native mail app via the IMAP server, but forced Android to use some garbage 3rd party software for it instead of GMail. In both cases, the IMAP server was easily seen and setup.
I also have a company phone, so I don't really care if they can wipe it. Again, if I was going to take data from them, I'd do it before I announced I was leaving like any reasonably-intelligent person... so wiping accomplishes nothing. But, again, these IT departments are really dumb and incompetent...
To answer your initial question, I don't know if there's a way to re-enable encryption... but I also don't think that this is something that they can detect anyway. I'm thinking it may be something else they're tripping over. You may consider installing Magisk, and then using it's HIDE feature to see if you can hide the typical "signs" of rooting/etc. It may be good enough to get you working. If it doesn't you simply remove Magisk again (or just stop using it)?
Thanks @ldeveraux and @schwinn8 for the replies!
I know we use Office 365 but I'll have to ask about web access to see if that is possible. It's my phone and supposedly it's "not required" that I install Company Portal/Outlook/Teams on my phone, but I would be the only one at the firm not doing that and I am a new hire so... kind of a bad look so soon. I am not really comfortable with them being able to wipe my phone either, but that wasn't mentioned to me... yet.
Also would have to ask about IMAP, but I doubt it. No company phones either which is fine.
Pretty sure it is the encryption (or lack thereof in my case) that is the issue. I already use Magisk v22 and Hide all signs of Company Portal and pass Safetynet. On another XDA thread where Company Portal is discussed, I followed the suggested steps to no avail:
1) Install Company Portal V5.0.5067.0
2) Magisk Hide ALL of Company Portal checkboxes
3) Reboot
4) Still pass SafetyNet
5) Launch Company Portal
While the app doesn't specify the encryption as to why it cannot get me to the login screen, that's the only conclusion I can reach at the moment.
Did either of you try or look into encryption built into the LG/Android Settings menu? I don't want to do that unless I know of someone with success with it, but am curious if that would allow root via Magisk Hide, encryption, and Company Portal.
Thanks!
Drew
No I stopped carrying when they wanted permission to wipe. If the company was paying for the phone, that's one thing. If I'm using my personal phone for company use, that doesn't fly.
I realize this doesn't answer your question at all, but it's food for thought!
ldeveraux said:
No I stopped carrying when they wanted permission to wipe. If the company was paying for the phone, that's one thing. If I'm using my personal phone for company use, that doesn't fly.
I realize this doesn't answer your question at all, but it's food for thought!
Click to expand...
Click to collapse
Carrying? Or did you mean caring?
drewcu said:
Carrying? Or did you mean caring?
Click to expand...
Click to collapse
Caring. I don't own a firearm.
ldeveraux said:
Caring. I don't own a firearm.
Click to expand...
Click to collapse
Lol got it. Just making sure I understood what you meant.
Assume you didn't look into the LG rom based encryption then?
drewcu said:
Lol got it. Just making sure I understood what you meant.
Assume you didn't look into the LG rom based encryption then?
Click to expand...
Click to collapse
No at that point I gave up
Hopefully you'll get some help here, because I'd still like to be able to actually use Outlook on my phone!
So, a quick search says that there are modules available and other things that need to be tried. One further thing is to hide root from various Google modules. I remember hearing that for some other apps... that you had to hide root from Google services. I also remember hearing that, in some cases, you have to clear data for apps after the hide, because they apparently save the rooted-status in their own data.
Basically, I doubt encryption is the issue... root is usually the problem and can be a bit tricky to hide properly. You just have to try things. I have never seen any app fail to work because encryption is not available... it's always a root-detection issue.
As for the IMAP thing, the point there is to use the settings you find elsewhere to access email. You're not asking IT for permission or info... you just need to find it. Most Microsoft-based IT places I have worked with have zero clue that this is open and offered, so once you find it it's just a matter of plugging in the right info.
As for the web-interface, again, my company (for example) doesn't tell us that we can use the Outlook app, but it works with no tricks whatsoever. Plug in your company account info and it figures out how to connect.
FYI, the module I mentioned above is referenced here: https://forum.xda-developers.com/t/...ne-company-portal-hider-intune-hider.3780451/ - no idea if this is necessary or even the latest version...
schwinn8 said:
So, a quick search says that there are modules available and other things that need to be tried. One further thing is to hide root from various Google modules. I remember hearing that for some other apps... that you had to hide root from Google services. I also remember hearing that, in some cases, you have to clear data for apps after the hide, because they apparently save the rooted-status in their own data.
Basically, I doubt encryption is the issue... root is usually the problem and can be a bit tricky to hide properly. You just have to try things. I have never seen any app fail to work because encryption is not available... it's always a root-detection issue.
As for the IMAP thing, the point there is to use the settings you find elsewhere to access email. You're not asking IT for permission or info... you just need to find it. Most Microsoft-based IT places I have worked with have zero clue that this is open and offered, so once you find it it's just a matter of plugging in the right info.
As for the web-interface, again, my company (for example) doesn't tell us that we can use the Outlook app, but it works with no tricks whatsoever. Plug in your company account info and it figures out how to connect.
FYI, the module I mentioned above is referenced here: https://forum.xda-developers.com/t/...ne-company-portal-hider-intune-hider.3780451/ - no idea if this is necessary or even the latest version...
Click to expand...
Click to collapse
Thanks for the suggestions! I actually have tried different modules without success both for EdXposed (Security Bypass for Company Portal with CP version 5.0.3013.0 and Bypass Exchange Policies). The closest I got was with CP 5.0.3013.0 where I could enter my credentials but then wasn't able to agree to the Terms and Conditions which is a prerequisite and got denied. The module you linked is no longer needed if using Magisk v22 with Magisk Hide according to people in the thread.
Have also tried the Outlook app, Outlook web access, Gmail, IMAP, POP3 -- all smartly locked down tight for compliance reasons by our IT. Just says to enroll with Company Portal after entering credentials.
Pretty sure the Magisk Hide route would work with V5.0.5067.0 if my device was encrypted. Company Portal checks whether your device is encrypted supposedly, so either you have to actually be encrypted or find a way around that. I am willing to be encrypted if I can still be rooted...
Not sure where to go from here to get it working without an encrypted device... but thanks for the post.
As I recall, Xposed is not really working or functional these days. The module I linked to is a Magisk module. Did you follow those directions, because it sounds like you didn't.
It sounds like you don't want to believe me... that's fine. I believe the answers are out there and it's just a root issue. You probably just need to do more reading and searching. I'm going to give up since you don't seem to want to hear it from me, so good luck...
If you find a solution, do let people know on this thread so the matter can be closed/completed.
I remember the other reason I stopped trying to use the Company Portal. They need permission to wipe my phone, which obviously I'm not cool with. Whenever I disable the Company Portal, mail stops working. That's reason enough!
schwinn8 said:
As I recall, Xposed is not really working or functional these days. The module I linked to is a Magisk module. Did you follow those directions, because it sounds like you didn't.
It sounds like you don't want to believe me... that's fine. I believe the answers are out there and it's just a root issue. You probably just need to do more reading and searching. I'm going to give up since you don't seem to want to hear it from me, so good luck...
If you find a solution, do let people know on this thread so the matter can be closed/completed.
Click to expand...
Click to collapse
Yes I am aware that the module you linked is for Magisk. If you go to the OP, all the text is struck through because the module is no longer necessary as I stated previously.
[MODULE] Microsoft Intune Company Portal Hider (Intune Hider)
Introduction: Simple Module To Hide The Root From Microsoft Intune Company Portal. - After The Installation & 1st Reboot, It Hides The Rooting & Disables Itself [P.S. Disabling Itself For Some Versions] - Enabling This Module From Magisk Manager...
forum.xda-developers.com
kb8no said:
It is easy to be confused. The "module" from the OP was needed before but is now obsolete since Magisk has gained the necessary functionality alone without the "module". There is no "module" in Magisk. Now go back and read the past posts over 2 months. First you hide Magisk so it passes safety net. Then you go into superuser MagiskHide, go into the app (eg Portal) and check everything. You need to understand that they updated Portal so you need to downgrade it so Portal will work again. You need to understand to use latest Magisk and Magisk changed. Not surprising you are confused. Now perhaps you have figured out the basics and the details will make sense.
Click to expand...
Click to collapse
So I followed the steps on page 23 of that thread using Intune Company Portal V5.0.5067.0:
[MODULE] Microsoft Intune Company Portal Hider (Intune Hider)
Introduction: Simple Module To Hide The Root From Microsoft Intune Company Portal. - After The Installation & 1st Reboot, It Hides The Rooting & Disables Itself [P.S. Disabling Itself For Some Versions] - Enabling This Module From Magisk Manager...
forum.xda-developers.com
IlyaKol said:
Good call on the GitHub ticket.
For anyone reading, this is the process I followed:
1) Uninstall the existing Intune Company Portal
2) Reboot
3) Install the APK listed above or from another source (I used APK Pure). DO NOT LAUNCH INTUNE!
4) Before launching, go into Magisk and make sure to hide ALL of it as well as all of Outlook, OneNote, OneDrive, Teams, etc. (whatever uses your company credentails)
5) Launch InTune and set it up.
6) Disable auto-updates of the app as he stated in Google Play Store.
7) Profit.
Click to expand...
Click to collapse
The result is I am still stuck on the "Open the Intune App" screen... No other error messages related to rooting, but cannot even get to log in or download Outlook or Teams. Have tried downloading the Intune App from the Play Store and that tells me to open Company Portal... so going in circles... I'm told I need to only use Company Portal from our IT firm.
I went through the same Magisk module thread and found others talking about not having encryption, and they are in the same position as I am -- following the steps or using the Magisk module (before Magisk v22) and still not getting CP to work.
Thus I am 99.9% sure I cannot use CP because I don't have encryption. You don't have to believe me, but I have tried everything I can think of save for using LG's Encrypt Phone feature... Would do it if I got confirmation I could stay rooted, not lose my data/settings, and then use Company Portal.
But yes, I absolutely would post the solution here if I find it!
Thanks anyway.
I'm rooted and have long had corporate email (two different companies) on a paid app called "Nine". First company was Fortune 100 global media company, and 2nd (past 3 years) is smaller but still has aggressive IT policies. Neither paid for my phone. I specifically remember with the first having to agree they could wipe the phone if it was lost -- but I think due to me being rooted they wouldn't be able to.
Nine - Email & Calendar - Apps on Google Play
Nine is a full-fledged and intuitive email app which supports Exchange and IMAP
play.google.com
ChazzMatt said:
I'm rooted and have long had corporate email (two different companies) on a paid app called "Nine". First company was Fortune 100 global media company, and 2nd (past 3 years) is smaller but still has aggressive IT policies. Neither paid for my phone. I specifically remember with the first having to agree they could wipe the phone if it was lost -- but I think due to me being rooted they wouldn't be able to.
Nine - Email & Calendar - Apps on Google Play
Nine is a full-fledged and intuitive email app which supports Exchange and IMAP
play.google.com
Click to expand...
Click to collapse
Just tried Nine and it also tells me after entering my credentials that I need to use Company Portal (just like Outlook and Web Access).
Do these two companies you worked for use Intune Company Portal to manage policies?
drewcu said:
Just tried Nine and it also tells me after entering my credentials that I need to use Company Portal (just like Outlook and Web Access).
Do these two companies you worked for use Intune Company Portal to manage policies?
Click to expand...
Click to collapse
I just installed portal and outlook, added both as admin or whatever it's called, and have a fully functioning inbox. I don't know if I'll leave it like this for the reasons I mentioned, but it works. I have the latest twrp, latest magisk, and adguard installed. I have no clue if I'm encrypted or not, how would I check? But I was trying to use the older version of Portal and it kept looping, so I installed the latest from the play store and we're up and running.
@ChazzMatt do you really think they can't wipe if they so desire? How could we confirm that? I surely don't want to give them that ability considering if you disable their permissions it stops working completely.
ldeveraux said:
I just installed portal and outlook, added both as admin or whatever it's called, and have a fully functioning inbox. I don't know if I'll leave it like this for the reasons I mentioned, but it works. I have the latest twrp, latest magisk, and adguard installed. I have no clue if I'm encrypted or not, how would I check? But I was trying to use the older version of Portal and it kept looping, so I installed the latest from the play store and we're up and running.
@ChazzMatt do you really think they can't wipe if they so desire? How could we confirm that? I surely don't want to give them that ability considering if you disable their permissions it stops working completely.
Click to expand...
Click to collapse
For Nine I only needed the email server name.
For the previous Fortune 100 company I worked for, it was almost 4 years ago so I don't remember all the details but I remember granting them the privilege but I don't remember adding them as an admin.
ldeveraux said:
I just installed portal and outlook, added both as admin or whatever it's called, and have a fully functioning inbox. I don't know if I'll leave it like this for the reasons I mentioned, but it works. I have the latest twrp, latest magisk, and adguard installed. I have no clue if I'm encrypted or not, how would I check? But I was trying to use the older version of Portal and it kept looping, so I installed the latest from the play store and we're up and running.
@ChazzMatt do you really think they can't wipe if they so desire? How could we confirm that? I surely don't want to give them that ability considering if you disable their permissions it stops working completely.
Click to expand...
Click to collapse
Company Portal didn't used to work for you, correct? What changed? Can you please list your steps this time?
I think to check encryption you use Termux and enter 'getprop ro.crypto.state' -- mine says unencrypted.
One other question is what version of Twrp are you using? I'm using one from 2 years ago -- 3.2.3 and never wanted to bother with the Pie one 3.3 or whatever is latest... Might have something to do with it...