From 723b3af75afe635c9cd243089e324afdae96a2ec Mon Sep 17 00:00:00 2001 From: Daniel Micay Date: Mon, 2 Mar 2020 08:05:15 -0500 Subject: [PATCH] split up ad-blocking section --- static/faq.html | 30 +++++++++++++++++++----------- 1 file changed, 19 insertions(+), 11 deletions(-) diff --git a/static/faq.html b/static/faq.html index 34a40830..6bc4a225 100644 --- a/static/faq.html +++ b/static/faq.html @@ -79,6 +79,7 @@ statistics?
  • Does GrapheneOS provide a firewall?
  • How can I set up system-wide ad-blocking?
  • +
  • Are ad-blocking apps supported?
  • @@ -520,11 +521,17 @@ included by the project many years ago, but it needs to be reimplemented, and it's a low priority feature depending on contributors stepping up to work on it.

    +

    + Are ad-blocking apps supported? +

    +

    Content filtering apps are fully compatible with GrapheneOS, but they have serious drawbacks and are not recommended. These apps use the VPN service feature to route - traffic through themselves to perform filtering. This approach is inherently - incompatible with encryption from the client to the server. The AdGuard app - works around encryption by supporting optional + traffic through themselves to perform filtering.

    + +

    The approach of intercepting traffic is inherently incompatible with encryption + from the client to the server. The AdGuard app works around encryption by supporting + optional HTTPS interception by having the user trust a local certificate authority, which is a security risk and weakens HTTPS security even if their implementation is flawless (which they openly @@ -533,14 +540,15 @@ go out of the way to allow overriding pinning with locally added certificate authorities. Many of these apps only provide domain-based filtering, unlike the deeper filtering by AdGuard, but they're still impacted by encryption due to Private DNS - (DNS-over-TLS). If they don't provide their own remote DNS servers, the apps require - disabling Private DNS. They could provide their own DNS-over-TLS resolver to avoid - losing the feature, but few of the developers care enough to do that. Using the VPN - service to provide something other than a VPN also means that these apps need to - provide an actual VPN implementation or a way to forward to apps providing one, and - very few have bothered to consider this let alone implementing it. NetGuard is an one - example implementing SOCKS5 forwarding, which can be used to forward to apps like - Orbot (Tor).

    + (DNS-over-TLS) and require disabling the feature. They could provide their own + DNS-over-TLS resolver to avoid losing the feature, but few of the developers care + enough to do that. + +

    Using the VPN service to provide something other than a VPN also means that these + apps need to provide an actual VPN implementation or a way to forward to apps + providing one, and very few have bothered to consider this let alone implementing it. + NetGuard is an one example implementing SOCKS5 forwarding, which can be used to + forward to apps like Orbot (Tor).

    Day to day use