NetGuard – no-root firewall 2.256 (Android 5.1+)

image
NetGuard offers straightforward and developed ways to block fetch entry to to the guidelines superhighway – no root required.

Applications and addresses can in my belief be allowed or denied fetch entry to to your Wi-Fi and/or cell connection.

Blockading fetch entry to to the guidelines superhighway can succor:

• lower your data utilization
• place your battery
• enlarge your privacy

Aspects:

• Easy to make converse of
• No root required
• 100% initiate source
• No calling house
• No monitoring or analytics
• No ads
• Actively developed and supported
• Android 5.1 and later supported
• IPv4/IPv6 TCP/UDP supported
• Tethering supported
• Optionally enable when show conceal on
• Optionally block when roaming
• Optionally block system capabilities
• Optionally mutter when an utility accesses the guidelines superhighway
• Optionally file network utilization per utility per address
• Subject materials create theme with light and dark theme

PRO aspects:

• Log all outgoing site site visitors; search and filter fetch entry to attempts; export PCAP recordsdata to examine site site visitors
• Allow/block particular particular person addresses per utility
• Fresh utility notifications; configure NetGuard as we enlighten from the notification
• Level to network tempo graph in a standing bar notification
• Snatch from five extra themes in both light and dark model

There is rarely any other no-root firewall offering all these aspects.

For those who might possibly include got a seek data from or arena, it’s possible you’ll possibly possibly send an email to [email protected]

For those who esteem to succor folks much less fluent in English, it’s possible you’ll possibly possibly succor translate NetGuard on your language: crowdin.com/mission/netguard/

For those who esteem to take a look at unique aspects, it’s possible you’ll possibly possibly take part in the take a look at program: play.google.com/apps/sorting out/eu.faircode.netguard

All required permissions are described here: github.com/M66B/NetGuard/blob/grasp/FAQ.md#particular person-lisp-faq42

The source code is on hand here: github.com/M66B/NetGuard

* Limiting log queue to 250 entries to forestall filling up the memory
* Yield tun and UDP site site visitors got extra concurrency and to forestall placing
* Enabled VPN handover by default again
* Updated translations

All changes: github.com/M66B/NetGuard/compare/2.255…2.256
Fetch Now