The iodé blocker already has good features and looks very well done! Nevertheless I have some wishes and questions:
What does “to” mean (see screenshot)?
What is the reason that the user apps
Pdf Viewer Plus
are not displayed in iodé blocker, even though they are allowed to access the internet by default in iodéOS (see Android settings under Apps)? I think it is very important that ALL user apps are in iodé blocker.
Note: The list of apps may be incomplete as I did not install a few iodé apps during the initial setup.
None of the system apps are displayed in iodé blocker. However, if you want to implement a strict whitelist principle, this is necessary. Will the “Show system apps” option be integrated into iodé?
Allow/deny internet access with the possibility to apply the whitelist principle would be very welcome. That is, you can deny Internet access generally for everything and allow it only for selected user apps and selected system apps. Or even always deny it to all apps and only allow selected domains in general or per app. Will the “allow/deny internet access” feature be integrated into iodé?
Furthermore the option “notify on internet access” would be very helpful. This would make it easier to identify dependencies of apps to their helper apps in particular. Will this be integrated into iodé?
I know that the iodé team is always busy making new features for the blocker. I hope the points I noticed now, are already on your to-do list or coming now.
Apps appear in the list when they effectively communicate through the network, in the concerned period of time (day, 7 last days, since installation). If you are sure that an app has communicated through the network but it does not appear in the list, that’s a bug.
Some system apps already appear (e.g. intent verification filter plus all preinstalled apps), but many do not appear indeed. They are filtered through the “Standard” black list though. We don’t want to flood the app list though, so we plan to make them all appear into a single aggregate app called something like “Android System”.
This is an interesting idea, we will think about it. We are however working on a new feature, to block network access depending on the network interface (wifi, mobile data, vpn), as well as defining default blocking state for newly installed apps. This is a bit redundant with android settings, but more powerful: it will be for example possible to allow blocking wifi and mobile data while still allowing vpn, regardless of the way the vpn is connected (wifi, …).
The whitelist principle for domain filtering could also be explored, we have to think about that.
We plan to integrate more the blocker in the overall user experience, to better interact with it. We will probably display some real-time data, and internet access may be one of them.
That sounds good! I will follow this up accordingly.
I can understand that the app list should not become confusing. However, in order to be able to control the system apps individually, I still think it is necessary to list them all separately. This could be solved by displaying the system apps in a separate list. You either look at the list with the clearly arranged user apps or the list with the system apps. You could perhaps use a switch to toggle between user apps and system apps. Maybe that would be a viable solution?
(By user apps I mean all apps that are displayed in the Android settings under Apps->All Apps. By system apps I mean the ones that are only visible there when you enable “Show system apps”).
That’s basically what I meant. You would just have to additionally make a switch “Block network access on/off” in the options.
If “Block network access off” is selected, the black list mode is active and only the apps that are checked under wifi, mobile data, vpn are blocked for the Internet.
If “Block network access on” is selected, the white list mode is active and only the apps that are checked under wifi, mobile data, vpn are allowed to access the Internet. Alternatively, no app can be checked in this mode and only individual domains (for example, via the existing “stream” item) are allowed to access the Internet.