this post was submitted on 20 Oct 2024
13 points (100.0% liked)

Privacy

31803 readers
155 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I saw a few VPN extensions on Mozilla's addon store but they require full access and is closed source . Foxy proxy seems open source and doesn't seem to be collecting any data for themselves and I'm hopping that combined with https sites only give the proxies which sites im visiting even if they wanted to sell me out CORRECT ME IF I'M WRONG THO . and i don't trust my isp much so it doesn't matter to me if they are selling that only but those vpn extensions will have acess to everything on every site . so yea feel free to correct me on anything and reccomend any .

edit : I don't want recommendations for vpn or any other way like changing dns etc . I just want to change the location on only firefox for android to get past some censorship and geo blocking . if you have any other way to achieve that or better extension than froxy proxy feel free to recommend .

edit : is there anyway to configure proxies on android firefox without using an extension ? i have access to about:config as i use fennec from fdroid .

top 15 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 2 weeks ago (1 children)

FoxyProxy has many DNS leaking bugs associated with the extension, especially when using SOCKS5 proxies. That extension has not been a recommended choice for a while now.

As others have said, a free proxy is not a good alternative, they are harvesting just as much data as your ISP, if not more (and possibly selling the info back to your ISP). Free proxies also have little incentive to be honest so there is a higher chance they could also be manipulating your traffic in various ways.

A better solution for mitigating data harvesting from your ISP is to just simply adjust your personal DNS settings. This can be configured globally on your router sometimes and/or each client device. Change your default DNS to a more privacy conscious provider such as Mullad, Quad9 or even Cloudflare. Those DNS providers also offer the option of making encrypted DNS requests using DNS over TLS (DoT) and DNS over HTTPS (DoH) which can be configured in your browser and sometimes your router.

At the end of the day, your ISP will still know you connected to a specific end point but they can't determine what exactly you are doing there, they only know you connected to something like Lemmy.world but would not be able to determine which communities you are visiting.

If a proxy still feels like the only solution then just buy a VPN subscription from a reputable source, its usually pretty cheap and way more effective at preserving privacy and security than any free proxy that is available. Mullvad is generally a pretty good and inexpensive choice plus they also have pretty decent proxy support.

As an alternative to FoxyProxy, check out the extension Container Proxy which allows you to containerize a tab and route all the traffic through a configured proxy which can also be configured on a site-by-site basis. Still, not perfect, but certainly a step above FoxyProxy.

[–] [email protected] 1 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

is this extension on ff android ? i thought foxyproxy was the most popular one and seem to be recommended by mozzila too so certainly not malicious by intend right ? read the edit of my post too .

[–] [email protected] 2 points 2 weeks ago (1 children)

Unfortunately container tabs are not yet supported for Android Firefox. FoxyProxy is by no means malicious, it certainly has good intentions and for the most part it does what it says it does. The problem is that due to many fundamental design choices it is too easy for information to leak. Plus the URL regex matching can be very finicky to work with. I used FoxyProxy for years but gave up on it after a while since I could never get a consistent and reliable experience out of it.

At this point I just alter the proxy settings in Android ff directly - no extension. Unfortunately ff profiles are also not supported on Android yet so if you don't want your main browser to always be attached to a proxy you can install other releases of ff such as Nightly and just configure that with proxy settings. If I am recalling correctly, you can also configure ff to apply proxy to either normal or private browsing too.

[–] [email protected] 1 points 2 weeks ago (1 children)

yes i have fennec fdroid which gives me acess to about:config . Have you got any guides with the process to set up a proxy through there ? Will this let the proxy server know everything that you do or is https still honored ?

[–] [email protected] 2 points 2 weeks ago (1 children)

Your proxy settings will depend on your provider but if you search for network.proxy you'll see all the setting you need in there. You'll connect either through http (ip+port) or socks. Socks adds an additional layer of authentication which is generally preferred but likely won't be offered by free options.

Yes, your proxy service will absolutely see what sites you are visiting. None of these suggestions will protect you from a malicious proxy service. Https is still honored assuming the end point is using a valid cert and your proxy has not tampered with it in any way. If the cert gets altered you'll get a warning from your browser, you then have to trust yourself to know when to back out.

[–] [email protected] 1 points 2 weeks ago

Eesh that seems risky af to even try . I'm just gonna back out i guess .

[–] [email protected] 3 points 2 weeks ago (2 children)

If you don't pay money for something, you are the product. In this case it would be your net flow data. It's not a good idea to use a free service if you're worried about privacy

[–] merde 3 points 2 weeks ago (2 children)

you're not the product on tor/orbot, protonVpn and riseUp.

[–] [email protected] 3 points 2 weeks ago* (last edited 2 weeks ago) (3 children)

I stand by what I said. If you examine who supports those organizations, they are getting a benefit.

The US Navy supports tor more than anybody else. Not to mention all of the government-run exit notes. Now you're the product here, is the product watching your data? Or is the product providing noise for their clandestine operations? Tor is a great thing, 100%, but it is being supported by people who get a benefit from it.

I'm sure you can find a counter example, but the point is it's about incentives. If the incentives aren't aligned you can't trust it. Not for mission critical objectives

[–] [email protected] 3 points 2 weeks ago

Tor is indeed about providing cover. US Military and US and German covert operations use it, and hide in the noise. But in those situations, it’s a win/win, as they provide funding and everyone gets to have a somewhat secure channel.

I’d argue though that in any case where you don’t control the exit node, you have no expectation of real privacy. So it becomes a question of how much you’re willing to trade.

[–] [email protected] 2 points 2 weeks ago (1 children)

what about the riseup and proton example he mentioned ? services like bitwarden etc are free but i don't see the users getting exploited in any way .

[–] merde 0 points 2 weeks ago* (last edited 2 weeks ago)

riseUp is slow. free vpn of Proton, depending on traffic and your exit, is a lot faster. Proton proved themselves to be trustable.

you can always upgrade to their paid service to have more options and servers, if you like. You can download your configurations to use your choice of addOn, app, software

mullVpn also is considerable, if you're going to pay (i don't use it but I've heard/read only + views

i use tor and orbot regularly. There, sadly, are too many sites that block them by default :/

[–] [email protected] 2 points 2 weeks ago

Arguably, Germany having the ability if they really wanted to, to timing attack you to deanonymize (at great cost) and potentially burning a mal-state * https cert to read contents, is a VASTLY different risk profile to a proprietary VPN actively hoovering in everything it can to put in ad profiles (which are also used by state actors)

[–] [email protected] 2 points 2 weeks ago

Word of caution, If you are actually staying within the Onion network then sure Tor is a great option... The problem is most users just use the exit nodes to reach the clear web. This is a convenient feature of Tor but it's also the least secure use case. There are a very limited numbers of exit nodes so they are often overused and the majority of them are maintained by government controlled entities since it takes a certain level of legal protection to operate an exit node.

[–] [email protected] 1 points 2 weeks ago

i don't care if they are atleast a bit legitimate . My isp is prolly selling me out more than they ever can anyway . and all they can see is the domain am going to right ? with the setup i described .