Thursday, January 25, 2024

BYOPPP - Build Your Own Privacy Protection Proxy

I have read a blog post, where you can build your own privacy proxy server built on Raspberry PI. The post got me thinking about how I can use this to protect my privacy on my Android phone, and also get rid of those annoying ads. 

Since I own a Samsung Galaxy S3 LTE with Android 4.3 (with a HW based Knox counter), rooting the phone now means you break Knox, and loose warranty. Past the point of no return ...

This means I have to solve this without root. Luckily newer Androids support VPN without rooting, but setting a mandatory system-wide proxy is still not possible without root. 
But thanks to some iptables magic and Privoxy, this is not a problem anymore :) 

The ingredients to build your own privacy protection proxy:
  • One (or more) cheap VPS server(s)
  • a decent VPN program
  • Privoxy
  • iptables

VPS server

To get the cheap VPS server, I recommend using Amazon EC2, but choose whatever you like. The micro instance is very cheap (or even free), and has totally enough resources for this task. I'm using the Ubuntu free tier now and it works like a charm. And last but not least Amazon has two-factor authentication! You can set up an Ubuntu server under 10 minutes. Use the AWS region nearest to you, e.g. I choose EU - Ireland.



VPN

For the VPN program, I recommend the free version of the OpenVPN AS (EDIT: be sure to use OpenVPN AS 2.0.6 or later, both on the server and the client). Easy to set-up quick start guide is here, GUI based configuration, and one-click client installer for Android, iOS, Windows, Linux, OSX. The Ubuntu installer packages are here.




The most important settings:

  • I prefer to use the TCP 443 and UDP 53 ports for my OpenVPN setup, and let the user guess why. 
  • For good performance, UDP is preferred over TCP. 
  • VPN mode is Layer 3 (routing/NAT).
  • Don't forget to allow the configured VPN ports in the AWS firewall (security groups). 


Other VPN settings:
  • Should VPN clients have access to private subnets (non-public networks on the server side)? - Yes
  • Should client Internet traffic be routed through the VPN? - Yes

Privoxy

The next component we have to install and configure is Privoxy. As usual, "apt-get install privoxy" just works. The next step is to configure privoxy via /etc/privoxy/config file, there are two options to change:
  • listen-address your.ip.add.ress:8118
  • accept-intercepted-requests 1
Beware not to allow everyone accessing your Privoxy server in the AWS EC2 security groups, be sure it is reachable only to VPN users!

After everything is set, start privoxy with "service privoxy start", and add it to the autostart "update-rc.d privoxy defaults".

Iptables

And the final step is to configure your iptables chain to forward every web traffic from the VPN clients to the Privoxy server:

iptables -t nat -A PREROUTING -s 5.5.0.0/16 -p tcp -m multiport --dports 80,8080,81 -j DNAT --to-destination your.ip.add.ress:8118 

Optionally you can block access to all other ports as well, and what does not go through your Privoxy won't be reachable.
Based on your Linux distribution and preference, you might make this rule persistent.

Final test

Now you can connect to the VPN server from your Android device.
After logging in from a client, you get the following nice packages to install on your device:


After connecting, the final results can be seen in the following screenshots. And yes, there is a reason I chose Angry Birds as an example.

Angry Birds without Privoxy
Angry Birds with Privoxy
Stupid flashlight app with ad
Stupid flashlight app with Privoxy
Spoiler alert
If you are afraid of NSA tracking you, this post is not for you. If you want to achieve IP layer anonymity, this post is not for you. As long as you are the only one using that service, it should be trivial to see what could possibly go wrong with that.

Known issues
Whenever the Internet connection (Wifi, 3G) drops, the VPN connection drops as well, and your privacy is gone ...
Sites breaking your privacy through SSL can still do that as long as the domain is not in the Privoxy blacklist.

Additional recommendation
If you are using OSX or Windows, I can recommend Aviator to be used as your default browser. It is just great, give it a try!

PS: There are also some adblock apps removed from the official store which can block some ads, but you have to configure a proxy for every WiFi connection you use, and it is not working over 3G.



Continue reading


  1. Hacker Tools List
  2. Kik Hack Tools
  3. Best Hacking Tools 2019
  4. Hacker Tools For Pc
  5. Pentest Tools Url Fuzzer
  6. Hack Tools
  7. Hacker Tools List
  8. Hacking Tools Download
  9. How To Hack
  10. Hacking Tools Free Download
  11. Tools For Hacker
  12. Pentest Tools Website Vulnerability
  13. Hacking Tools For Games
  14. Pentest Tools Apk
  15. Hacking Tools Online
  16. Hack And Tools
  17. Pentest Tools For Windows
  18. Hack Tools Mac
  19. Hacker Tools Apk
  20. Nsa Hacker Tools
  21. Hack Tools For Mac
  22. Pentest Tools List
  23. Hacking Tools 2020
  24. Wifi Hacker Tools For Windows
  25. Pentest Tools Online
  26. Nsa Hack Tools Download
  27. Hacker Tools List
  28. Hacking Tools For Kali Linux
  29. Pentest Tools Kali Linux
  30. Hack Tool Apk No Root
  31. Free Pentest Tools For Windows
  32. Hack Tools For Windows
  33. Hacker Tools Software
  34. Hacking Tools For Kali Linux
  35. Hacker Techniques Tools And Incident Handling
  36. Hack Tools Online
  37. Pentest Tools Tcp Port Scanner
  38. Pentest Tools List
  39. Computer Hacker
  40. Pentest Automation Tools
  41. Top Pentest Tools
  42. Hacker Tools Software
  43. Pentest Tools Online
  44. World No 1 Hacker Software
  45. Termux Hacking Tools 2019
  46. Pentest Reporting Tools
  47. Hackers Toolbox
  48. Hacker Tools Mac
  49. Hacker Tools Online
  50. Pentest Tools Online
  51. Pentest Tools
  52. Pentest Tools For Ubuntu
  53. Pentest Tools For Windows
  54. Underground Hacker Sites
  55. Hacker Tools For Mac
  56. Hacker Security Tools
  57. Hacker Tools Linux
  58. Hacker Tools 2019
  59. Hacking Tools Kit
  60. Hacking Tools For Mac
  61. How To Make Hacking Tools
  62. Hacking Tools 2020
  63. Hacker Tools Apk Download
  64. Github Hacking Tools
  65. Hack Tools Mac
  66. Wifi Hacker Tools For Windows
  67. Hacking Tools Usb
  68. Underground Hacker Sites
  69. Hacker Tools For Mac
  70. Hacker Tools Hardware
  71. Hack And Tools
  72. Hack Tools
  73. Hacking Tools Usb
  74. Best Hacking Tools 2020
  75. Hacking Tools Name
  76. Pentest Tools For Mac
  77. Hacker Tools Hardware
  78. Pentest Tools Website
  79. Hacker Hardware Tools
  80. Hacker Hardware Tools
  81. Hack Tools For Windows
  82. Hack Website Online Tool
  83. Hack Tools For Windows
  84. Hack Tools For Windows
  85. Hacker Tools 2020
  86. Pentest Tools Online
  87. Nsa Hack Tools Download
  88. Underground Hacker Sites
  89. Best Pentesting Tools 2018
  90. Pentest Tools Website
  91. Hacking Tools Usb
  92. Hacker Tools Windows
  93. Hack Tools For Games
  94. Hacker Tools 2020
  95. Hacker
  96. Pentest Tools Subdomain
  97. Pentest Recon Tools
  98. Hacker Tools Online
  99. Pentest Tools List
  100. Hacker Tools Free
  101. Nsa Hack Tools Download
  102. Hacker Techniques Tools And Incident Handling
  103. Pentest Tools Url Fuzzer
  104. Hack Rom Tools
  105. How To Install Pentest Tools In Ubuntu
  106. New Hack Tools
  107. Hacking Tools Kit
  108. Pentest Tools Website Vulnerability
  109. Pentest Recon Tools
  110. Hack Tools 2019
  111. Hacker Tools 2019
  112. Hack Tools Github
  113. Hacker Hardware Tools
  114. Hacking Tools For Beginners
  115. Hacking Tools And Software
  116. Hack Rom Tools
  117. Install Pentest Tools Ubuntu
  118. Pentest Tools Website
  119. Hacker Tools Mac
  120. Hack Tool Apk
  121. Underground Hacker Sites
  122. How To Install Pentest Tools In Ubuntu
  123. Hacker Search Tools
  124. Hacker Tools Online
  125. Hacking Tools Online
  126. Hack Tools For Games
  127. Pentest Tools For Windows
  128. Hack Tools Download
  129. Pentest Tools Url Fuzzer
  130. Pentest Tools Website
  131. Hacking Tools Software

No comments: