this post was submitted on 07 May 2026
758 points (99.6% liked)

Technology

84463 readers
4354 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] henfredemars@infosec.pub 16 points 2 days ago (2 children)

Extremely lame work by Google. Infeasible? Why? This is absolutely a security vulnerability. Any ad SDK on any app on your phone can use it to associate your VPN activity.

[–] WhyJiffie@sh.itjust.works 5 points 1 day ago

as an ad company they know that perfectly well

[–] 0_o7@lemmy.dbzer0.com 2 points 1 day ago* (last edited 22 hours ago)

It's in the same way infeasible as implementing network/data block for individual apps. This feature has been on custom ROMs for a decade but never got into Android.

They've been baking Android for ads and surveillance and are now clamping down harder into how people can customize it.

They aren't even afraid to hide these features as "bugs" anymore. If you turn off background data for an app on pixel, it will turn back on automatically when you reboot.

Also a thing about the government spying on notifications. Even if you disable notifications for your browser, if you ever play a media on it, it will show up on conveniently above the notifications panel. Sketchy AF.