![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/0d5e3a0e-e79d-4062-a7bc-ccc1e7baacf1.png)
did the site allow ranking of politicians or billionaires?
did the site allow ranking of politicians or billionaires?
i am ashamed to say that i have driven when drunk. this was over a decade ago and i don’t remember the 13km trip taken late at night.
i am thankful that the car was found intact on inspection the next morning and i hadn’t hit anybody.
but that was the last time i drove drunk. i was a prize idiot to do so–as is anyone else who does so.
as much as one hates whatsapp, the headline is not the most accurate. the article states that it’s not specifically a vulnerability in whatsapp itself that exposes a correlation between a sender of a message and probable recipients.
this is a flaw that can be used regardless of your choice of messaging platform. but, yeah, even if whatsapp itaelf didnt drop the ball in this particular instance, still don’t use it.
the scenes when one won’t be able to choose 5318008.
we’ve found the early bird.
there are a few time trackers on f-droid that seem to fit thia requirement.
“a time tracker” is one.
i put this question to my cat while parading naked in front of it.
i got no response other than a look of utter disdain.
all good info. and all agreed. but the issue in this post isn’t the vpn functionality.
it’s what the adguard android app does in the background when the vpn, itself, is disconnected. that’s when these rogue requests were sent.
this is a possibility. one that i haven’t accounted for.
but is there any literature that verifies this? the closest I’ve found in context is this page, and I’m not able to resolve what you’re saying with whats on there: https://adguard.com/kb/general/ad-filtering/filter-policy/
i don’t have enough info yet to update the post with this conjecture.
the vpn wasn’t connected at the time these requests were sent. that’s how DDG captures these requests, by using the vpn slot itself. these requasts were sent by the adguard app in the background when it was deactivated.
the data sent to third-party ttrackers had nothing to do with the vpn functionality or of other apps funneling their data through it.
this observation has also been corroborated by another user using other means elsewhere in the comments. do give it a dekko, too.
yes, that’s my question too.
i get what you’re saying, but the vpn was inactive when the app sent these requests. DDG was active at the time and using the VPN slot.
so it isn’t the vpn functionality, per se, of the app that’s doing anything here.
i get what you’re saying, but the vpn was inactive when the app sent these requests. DDG was active at the time and using the VPN slot.
so it isn’t the vpn functionality, per se, of the app that’s doing anything here.
i can see where you’re going with this but, no, these are not sites that i’ve visited. for example, my country has its own amazon domain and verizon does not operate where i live.
nope, this is all the adguard vpn android app on its own.
thanks for the feedback. i would be happy to hear what I’m presuming incorrectly here. always willing to learn and gain an understanding of how things do work.
wow. this is good detail, indeed!
so is this an app one should avoid using, then?
i dont know why it’sa at such a low resolution here. it’s fine on my phone.
here, ill try uploading a fresh non-stretched single-screen screenshot to see if the size was the issue.
(i don’t know how it will turn out myself until after i post it.)
would you have done this with the ad guard vpn deactivated but the app still running in the background?
I’ve been using the app for a few montha now and it’s only today that it got flagged in the DDG report. it’s not shown up before.
you are correct. activating one switches off the other. but the adguard vpn app still runs in the background even with its own vpn deactivated – and that’s when these requests were caughtin DDG’s net.
I’m a mirror. if you’re nice to me, I’m nice to you. if not, well…