ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Anyone using AdGuard?

    Scheduled Pinned Locked Moved IT Discussion
    9 Posts 4 Posters 735 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Alex Sage
      last edited by

      AdGuard DNS is an alternative way to block ads, trackers and phishing websites, and also a parental control instrument.

      Supports DNSCrypt, and it's free 🙂

      https://adguard.com/en/adguard-dns/overview.html
      https://github.com/AdguardTeam/AdguardDNS

      1 Reply Last reply Reply Quote 0
      • black3dynamiteB
        black3dynamite
        last edited by

        I've only used AdGuard browser extension.

        1 Reply Last reply Reply Quote 0
        • NashBrydgesN
          NashBrydges
          last edited by

          Ummmm...wut? Adding cert to local browser? Am I reading this correctly?

          https://kb.adguard.com/en/general/https-filtering

          A 1 Reply Last reply Reply Quote 0
          • NashBrydgesN
            NashBrydges
            last edited by

            In case anyone is interested.

            https://adguard.com/en/privacy.html

            1 Reply Last reply Reply Quote 0
            • A
              Alex Sage @NashBrydges
              last edited by

              @nashbrydges can you think of a better way to do it?

              NashBrydgesN 1 Reply Last reply Reply Quote 0
              • NashBrydgesN
                NashBrydges @Alex Sage
                last edited by

                @aaronstuder said in Anyone using AdGuard?:

                @nashbrydges can you think of a better way to do it?

                The problem with this is that it exposes you to a MitM attack. Here is an article about how Kaspersy AV that did this same thing exposed their users to MitM attacks.
                https://www.pcworld.com/article/3154608/security/https-scanning-in-kaspersky-antivirus-exposed-users-to-mitm-attacks.html

                Lenovo Superfish was an example of HTTPS scanning gone wrong (albeit an extreme example). AdGuard would decrypt your connection and therefore have full access to the session traffic. It inspects this content (reads it) and then encrypts the outgoing connection back to your PC.

                Many companies do this type of https inspection via their network filtering devices or UTMs but in each case, that inspection device can read your content in order to perform the inspection.

                A 1 Reply Last reply Reply Quote 1
                • JaredBuschJ
                  JaredBusch
                  last edited by

                  yeah, fuck MitM shit.
                  This is why I do not like WatchGuards and such either.

                  1 Reply Last reply Reply Quote 2
                  • A
                    Alex Sage @NashBrydges
                    last edited by

                    @nashbrydges I understand that. It would need to be done correctly.

                    NashBrydgesN 1 Reply Last reply Reply Quote 0
                    • NashBrydgesN
                      NashBrydges @Alex Sage
                      last edited by

                      @aaronstuder said in Anyone using AdGuard?:

                      @nashbrydges I understand that. It would need to be done correctly.

                      Even when done correctly, you now have a single exposure point instead of many hundreds. You're relying fully on 1 source to properly encrypt traffic between you and itself and then itself and the source, rather than distributing the risk across the hundreds of sites you might visit. It's easy to inspect the SSL cert validity of a website that you visit directly, not possible if you are routing via a 3rd party who is managing that connection on your behalf.

                      This concern would only apply to the HTTPS inspection though. Using their DNS service is like using any other DNS service.

                      1 Reply Last reply Reply Quote 0
                      • 1 / 1
                      • First post
                        Last post