Today I released a FireWall package on Thireus Cydia Repository… Untrusted Hosts Blocker
Do you know that iOS applications can track you and steal data from your device? These information are transmitted behind your back to online hosts. Now say STOP to ads, spies, tracking and untrusted hosts on your JailBroken iPhone/iPad/iPod Touch. Have a quick look here.
Update: 1.5.1 update is out! Hosts are now redirected to 0.0.0.0 which is more efficient than 127.0.0.1. (Thanks to zeflash for the report )
Update: 1.6 update is out! winhelp2002 list updated + hosts from user requests + special list from Nervous94 (blocking various Cydia ads).
Block more than 16,000 blacklisted hosts! This is not just a classic adblocker but a powerful FireWall for confidentiality and security purpose. This package will add all blacklisted hosts to your /etc/hosts file. If you are unhappy with this hack, you can uninstall this package, all installed entries will be automatically removed.
If you want to add more hosts or delete some, feel free to contact me.
How do I install this package?
Add Thireus Repository http://repo.thireus.com/ to Cydia and install the package named “Untrusted Hosts Blocker“.
Is it safe?
Hosts entries have been validated by myself. Most of these hosts are from the work of winhelp2002 and 0th3lo, some blacklisted hosts are from me. The provided hosts modifications have been used by myself for years on my iPhone 3GS and MacOS X. Most of the blacklisted hosts have been manually tracked and classified as untrusted or dangerous.
All entries redirect the traffic to
127.0.0.1 0.0.0.0, there is only one exception (22.214.171.124 gs.apple.com).
I took the time to monitor common iOS apps (about 30) to check if more hosts must be added and if the current FireWall rules do not affect the functioning of applications. Then, I packaged everything for you
You are free to uninstall this package. Uninstallation can take up to 3 minutes and remove all added entries to restore your hosts file
Why should I install it?
This FireWall is designed to block all hosts classified as untrusted or dangerous.
Some information an App Store application can steal:
- Mobile phone number
- App ID
- iPhone model
- Text Messages
- All Incoming & Outgoing Call Logs
- GPS Location (Tracking)
These information are transmitted online (during the use of the application), for advertising, to track you or to do nasty things behind your back.
The purpose of ‘Untrusted Hosts Blocker‘ is to block most of the hosts that request these information and provide an adblocker for your iDevice.
For your security and confidentiality I recommend you to install this package.
Incoming search terms:
Update: Under 5.0.1, only Safari (only) bypass locally-stored .pac rules… Please READ issue #6 on Common iOS 5 JailBreak Issues – Restoration Fails or Hangs, Location Service causing Signal and WiFi Loss, Fix Push Notifications
This article is not for noobs, I’m not gonna explain how things work. I’m just providing all the required files to have a socks proxified connexion with a jailbroken iPhone/iPod Touch/iPad.
If you are not good at French, use Google Translate.
Download this archive:
You’ll find in it, two folders.
- mobile_folder –> Files need to be put into your mobile folder on your phone (home directory)
This script needs to be edited for your own configuration. This script must be called by the Terminal application on your iDevice after every reboot of the device (I personally don’t want to launch it automatically). This script will automatically connect you via ssh to your server every time the device gets connected to a Wifi network (you can also ask it to open a tunnel over 3G, please read the source code to activate it!).
black_hole_http_server.pl + null.gif :
These files are needed to get a black hole http server, this is where banned requests are sent, and they get a null.gif reply, so for example banned ads will show a null.gif image (this actually doesn’t work as expected… and I really don’t know why, the first time the script is launched it works well and we can see the null.gif instead of ads, but after we get a 404 image . If someone knows why please contact me!)
- server –> Files need to be put on your server, or on the internet
This file provides the rules whether the requests are sent to the black hole or via your ssh tunnel You have to make it available over the web, because this file will be called into your network settings and OS 3 doesn’t allow us to use local pac files. For 3G network you have to edit your network pref plist file and enter the URL manually.
URL can be http:// or file:///private/var/root/ (file:/// is bypassed by Safari under 5.0.1)
Note: I don’t use socks over 3G anymore because every 10Mo of downloaded data the tunnel gets resetted.
Note 2: Obviously you need to install perl, ssh, etc…
Note 3: More in can be found on my old blog http://thireus.dareyourmind.net/iphone-hacks/115-how-to-get-socks-proxy-ssh-tunneling-to-work-on-a-jailbroken-iphoneipod-touchipad