Hacker Newsnew | past | comments | ask | show | jobs | submit | nitrohorse's commentslogin

I'd be wary of using this site and stick w/ the onion sites linked on the Wiki page until we know this is actually "official" [1] [2].

[1] https://en.wikipedia.org/wiki/Z-Library [2] https://old.reddit.com/r/zlibrary/comments/ytqzy0/eli5_zlibi...


Trying LockDown mode; looks like backups are still occurring as expected.


Soooooo, it's "wide open to the FBI and any state agencies that get access to Apple's servers"-mode?


Yup. My naive impression of it is “we don’t trust our code to not back door your device, so we let you turn the highest risk portions of it off now. Mostly, gifs, because we’re don’t know how to safely parse a 35 year old standard.”


Lol, meanwhile they store Chinese data in CCP data centers. What a joke.


Yattee [1] and AdGuard [2] are two solutions I’ve found that can help.

[1] https://github.com/yattee/yattee [2] https://adguard.com/en/blog/how-to-add-a-shortcut-to-block-y...


Holy cow how have I not heard of testflight installation method with which yattee is being distributed! Reading up more on it, seems you need to be an ios developer to use it. Beh.

Thanks for mentioning yatee, as adguard is severely lacking in that ads are rarely blocked.


I don’t think I’ve seen a single ad since I bought AdGuard premium and configured it properly. It feels less capable than uBlock Origin but I find it honestly good enough on iPhone


You don't need to be a developer for test flight. I am not an iOS developer, but I have installed test flight for access to a few different apps.


it seems Testflight constantly feeds usage data & telemetry back to the app developer


Wow thanks for this. Installed Yattee. Already knew about adguard, but Youtube has managed to beat it on occasion.



https://www.doineedavpn.com enumerates legitimate use cases well I think.

> This site was conceived and built by IVPN to challenge aggressive marketing practices in the VPN industry.


> Hide geographic location

> VPNs do not effectively solve this issue. Most modern browsers can detect the geographic location of a device based on data from GPS, available Wi-Fi networks and GSM/CDMA cell IDs and will submit this information to websites requesting it.

Did I miss something? Even the ad-tech browser will ask the user before sharing that?


I block the Mozilla positioning trackers. They were getting over a million request per month from my household. It’s just a regular API call from any website and doesn’t need any browser permissions.




Thank you! That's perfect! And a bit ironic that the RSS feed is on a Google product aka the company that kill Google Reader.


Take a look at my reply to the OP


Nice app! I created configuration profiles for convenience at https://encrypted-dns.party but an app with providers pre-configured is way more convenient. Some smaller providers that come to mind for ad-blocking: Adhole, AhaDNS, BlahDNS, LibreDNS, and Usable Privacy DNS.


Thank you. I have put these in a list I'm creating to add to the app. I only recently learned to make iOS apps and SwiftUI is rather still new. Rather I wanted to learn how make apps so I thought might as well make something people can use. I plan on making it much better UI wise along with region-specific DNS lists or some method of sorting them.



These lists seem great but aren’t in a pihole-compatible adlist format. Did you mean that one could take these and create pi-hole lists?


Thanks for replying to the question i meant to ask! I will check those blocklist!


Related, looks like Signal recently added a support doc for this issue.

https://support.signal.org/hc/en-us/articles/360055276112-In...

More discussion found at https://community.signalusers.org/t/signal-should-warn-users...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: