Hey all,
Just checking now that we implemented REGEX/ wildcards, if you still use an other adblocker along with iodé?
What do you miss in iodé? Do you have any suggestions?
Thanks!
Hey all,
Just checking now that we implemented REGEX/ wildcards, if you still use an other adblocker along with iodé?
What do you miss in iodé? Do you have any suggestions?
Thanks!
there are two things that made me using still dns66:
Hello, it’s been a whilesince the question was asked but I really think it would add a lot of value for privacy conscious people like iodé users if you coul add a block list import feature, here are a few elements on this :
I think this is really a key feature to provide a proper dns blocking to the user.
Happy to discuss/test/elaborate in the future on this !
System level, no. It’s because the iodé app has been able to block many trackers across the apps I use without breaking functionality.
As for browser level, yes. I use Brave (which has its inbuilt adblocker) because I’ve been a longtime user and it blocks Youtube ads.
Same for me. I want to know which recipients these non-free or ethically unsatisfactory networks are.
Could somebody from the iodé team provide us with that information?
I also had the dream
All of these things, making the iode app more user-friendly, more modular, being able to use your own lists, etc., are on the to-do list. You just have to be patient. That will come. The announcements weren’t that long ago.
Here it has an article about the app.
I use ProtonVPN in addition. It catches some ads (and other) that pass iode. Of course the VPN interferes with some apps (SONOS especially) and other websites checking your location (YouTube TV via web browser especially).
I am using Blokada5 along with iodé Advanced Privacy.
With Blokada5 I have a display/dropdown in the phone’s notifications area, where real-time outgoing connections, both allowed and blocked, are listed, and it indicates how many minutes or days ago the outgoing link occurred, much like Pi-hole does.
But Advanced Privacy shows me clearly which connections were made by which apps. This is how I was able to identify the %#*^(@& app that keeps trying to contact dns.google
, which I blocked long ago (and amazonaws
, by the way). I suspected it was Proton Mail, due to the timing shown in Blokada5, but was able to confirm it by visiting iodé Advanced Privacy > Report and then clicking on the Proton Mail report. (And even if I disable “Alternative routing” in the Proton Mail app, it continues to attempt the connection to Google, before finally honoring my Quad9 setting.)
One disadvantage with Blokada5 is that it can’t be used in conjunction with my VPN.