Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Apple (or iOS) actually has a robust built-in way to filter and block traffic using configuration profiles. I’m uncertain if you can configure it per-app, but you can definitely whitelist/blacklist hostnames. For an example of this in action, check out this system-wide ad blocker https://myxxdev.github.io/depictions/MYbloXXforiOS/MYbloXXfo...


Can it be reliably configured to “fail off” ?

That is, if my configuration profile Becomes invalid or is non-functional, Will it just cease to pass traffic?


In my limited experience, when mybloxx (very rarely) has a problem, it blocks all network access and I have to go in and “reset iOS connection cache” or “reset mybloxx”, two separate options in mybloxx that I’m unsure of what they do behind the curtain.

I hope someone who is more knowledgeable about the configuration profiles can give you a definitive answer.


This looks very sketchy. I'd recommend checking out Little Snitch instead.


That website … scares me. Why are you trusting this product? Is there source available or some audit record?


I could have sworn there was source for it a few years ago but looking again I can’t seem to find it. I think the dev might have taken it down because others were reusing his code according to r/jailbreak

Anyway I do trust the developer, he’s been at it a number of years working on this thing, and most importantly it really does work well, blocking the most amount of ads vs other blockers. He’s obviously not a web dev and the jailbreak scene is kind of scrappy so I can forgive the website. Look past the formatting and see what’s there. If you want to use the method but not run any code you can manually supervise your idevice but you have to backup / wipe / restore in order to do it on stock iOS. The pac scripts are open source and you can self-host them if you’re truly paranoid.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: