e551837538 | ||
---|---|---|
app | ||
gradle/wrapper | ||
.gitignore | ||
LICENSE | ||
NetGuard.iml | ||
PLAY-ro.md | ||
PLAY-zh-rCN.md | ||
PLAY.md | ||
README.md | ||
build.gradle | ||
gradle.properties | ||
gradlew | ||
gradlew.bat | ||
ic_network_cell_white_24px_roaming.xcf | ||
play.png | ||
play.xcf | ||
screenshot1.png | ||
screenshot1_full.png | ||
screenshot2.png | ||
screenshot2_full.png | ||
settings.gradle | ||
strings.sh |
README.md
NetGuard
NetGuard provides a simple way to block access to the internet - no root required. Applications can individually be allowed or denied access to your WiFi and/or mobile connection.
Blocking access to the internet can help:
- reduce your data usage
- save your battery
- increase your privacy
NetGuard is possibly the first free and open source no-root firewall for Android.
Downloads:
- GitHub
- Play store (stable)
- Play store (beta)
- F-Droid (unsupported, often outdated)
- XDA Labs (web page)
Features
- No root required
- Simple to use
- Free of charge
- Open source
- No extra battery usage
- No bandwidth reduction
- No calling home
- No tracking or analytics
- No ads
- No internet permission required
- IPv4/IPv6 TCP/UDP supported
- Optionally allow when screen on
- Optionally block when roaming
- Optionally block system applications
- Material design
Most of these features are the result of sending selected traffic to a sinkhole, instead of filtering all internet traffic. This means that advanced features, like address based filtering (needed for ad blocking), traffic logging, and on-demand configuration, are not possible. Routing selected traffic into a sinkhole relies on an API introduced in Android 5.0 (Lollipop), therefore older Android versions unfortunately cannot be supported.
Usage
- Enable the firewall using the switch in the action bar
- Allow/deny WiFi/mobile internet access using the icons along the right side of the application list
Permissions
- ACCESS_NETWORK_STATE: to check if the device is connected to the internet through WiFi
- RECEIVE_BOOT_COMPLETED: to start the firewall when booting the device
- WAKE_LOCK: to reliably reload rules in the background on connectivity changes
- com.android.vending.BILLING: to accept donations via in-app billing
Compatibility
Devices / ROMs with a broken VPN implementation:
- Samsung Galaxy A5 / Android 5.0.2, reported on Github (all traffic blocked)
- Asus ZenFone 2 / Android 5.0.2/5.1.1, reported on XDA (all traffic blocked)
- Lenovo YOGA Tablet Pro-1380L/Yoga Tablet 2 Pro 5.0.1, reported on XDA (all traffic blocked)
NetGuard will crash when the package com.android.vpndialogs has been removed or otherwise is unavailable.
Tethering will not work when NetGuard is enabled due to a bug in Android (issue).
Greenifying NetGuard will result in rules not being applied when connectivity changes from WiFi/mobile, passive/active, and roaming/not roaming.
Frequently Asked Questions (FAQ)
(1) Can NetGuard completely protect my privacy?
No - nothing can completely protect your privacy. NetGuard will do its best, but it is limited by the fact it must use the VPN service. This is the trade-off required to make a firewall which does not require root access. The firewall can only start when Android "allows" it to start, so it will not offer protection during early boot-up (although your network may not be loaded at that time). It will, however, be much better than nothing, especially if you are not rebooting often.
If you want to protect yourself more, you can (at least in theory) disable WiFi and mobile data before rebooting, and only enable them on reboot, after the firewall service has started (and the small key icon is visible in the status bar).
Thanks @pulser
(2) Can I use VPN applications while using NetGuard?
If the VPN application is using the VPN service, then no, because NetGuard needs to use this service. Android allows only one application at a time to use this service.
(3) Can I use NetGuard on any Android version?
No, the minimum required Android version is 5.0 (Lollipop) because NetGuard uses the addDisallowedApplication method.
(4) Will NetGuard use extra battery power?
No, unlike most of the similar closed source alternatives.
(5) Can you add selective allowing/blocking applications/IP addresses?
Unfortunately, this is not possible without using significant battery power and adding complex code to do network translation from OSI layer 3 to layer 4 (and thus implementing a TCP/IP stack), which will inevitably introduce bugs as well. This is how most (perhaps all) other no-root firewalls work. NetGuard is unique, because it doesn't implement a TCP/IP stack, and is therefore both highly efficient and simple.
For more advanced use cases, rooting your device and using an iptables based firewall, like AFWall+, might be a better option and will not sacrifice any battery power.
(6) Will NetGuard send my internet traffic to an external (VPN) server?
No. It cannot do this because NetGuard does not even have the internet permission.
(7) Why are applications without internet permission shown?
Internet permission can be granted with each application update without user consent. By showing all applications, NetGuard allows you to block internet access before such an update occurs.
(8) What do I need to enable for the Google Play Store to work?
You need 3 packages (applications) enabled (use search in NetGuard to find them quickly):
- com.android.vending
- com.google.android.gms
- com.android.providers.downloads
Since the Google Play Store has a tendency to check for updates or even download them all by itself (even if no account is associated), one can keep it in check by enabling "Allow when device in use" for all 3 of these packages. Click on the down arrow on the left side of an application name and check that option, but leave the network icons set to red (hence blocked).The little human icon will appear for those packages. By doing this, you can still open the Google Play Store and update/install/uninstall applications since it will have internet access, but once you close it, it will not use any bandwidth.
(9) Why is the VPN service being restart?
The VPN service will be restarted when you turn the screen on or off and when connectivity changes (WiFi, mobile) to apply the rules with the conditions 'Allow when device is in use' and 'Block when roaming'.
(10) Will you provide a Tasker plug-in?
If disabling NetGuard is allowed to Tasker, any application can disabled NetGuard too. Allowing to disable a security application from other applications is not a good idea.
(12) Can you add on demand asking to block/allow access?
Besides that this requires questionable Android permissions, it is not possible to implement this, given the way NetGuard works. For more details, see question 5.
(13) How can I remove the ongoing NetGuard entry in the notification screen?
- Long click the NetGuard notification
- Tap the 'i' icon
- Depending on your device and/or ROMs manufacturer software customisations, you can be directed to either:
- the App Info screen and you can uncheck 'Show notifications' and agree to the next dialog
- the App Notifications screen and you can toggle the 'Block' slider to on
Note that, whether or not you get a dialog warning to agree upon, this operation will disable any warning notifications from NetGuard as well.
(14) Why can't I select OK to approve the VPN connection request?
Please read here.
Support
- Questions: please use this XDA-Developers forum thread
- Feature requests and bugs: please create an issue on GitHub
Please do not use GitHub for questions.
Contributing
Translations:
- Translations to other languages are welcomed
- Check if the language is supported by Android and find its locale
- Copy this file to the correct locale folder
- Translate the strings in the copied file and omit all lines with translatable="false"
- Create a pull request on GitHub for the new/updated translation
Current translations:
- Arabic (ar)
- Dutch (nl)
- Simplified Chinese (zh-rCN)
- English
- French (fr)
- German (de)
- Italian (it)
- Japanese (ja)
- Korean (ko)
- Polish (pl)
- Romanian (ro)
- Russian (ru)
- Slovak (sk)
- Spanish (es)
Please note that you agree to the license below by contributing, including the copyright.
Attribution
NetGuard uses:
License
GNU General Public License version 3
Copyright (c) 2015 Marcel Bokhorst (M66B)
All rights reserved
This file is part of NetGuard.
NetGuard is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your discretion) any later version.
NetGuard is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with NetGuard. If not, see http://www.gnu.org/licenses/.