Google has already fixed it, we are waiting for them to ship the fix to Android users.
There is plenty of apps that use this method. Orbot (Tor), for instance. The thing is that it might be not that important to a regular VPN app as it is to AdGuard. Anyways, I've just filed another report to...
We're still collecting the full list. It takes time, but once the process is fully automated, we'll publish the list.
Please note, that I am talking about the list of first-party domains that will be blocked by all ad-blocking software, and not about disguised trackers which are known already...
That's correct, we have reverted the price of lifetime licenses back to x2.5 - x3 of a yearly license price. This change is not related to Black Friday directly. Rather preparation for the BF promotion made us realize we made a mistake during the recent licensing system change.
This is not fixed, just delayed.
Guys, this is a confirmed bug by the Android team. The fix was already merged into the Android code, and the only question is when Google finally decides to ship it to users.
All VPN apps that use this method (getConnectionOwnerUid) are affected.
Not all apps...
This is very wrong indeed, and I don't observe this behavior on our test computers.
Also, A LOT of different issues were solved in v7.2 that is currently in the nightly update channel.
I'd be grateful if you could spare some time to help us figure out what's this issue is about, and try this...
Yep, it is not bypassed by default.
This is due to how DNS filtering works:
1. It configures Android to use a fake DNS address
2. Then when it sees that the connection is to this fake address, the connection is being redirected to the AdGuad's own DNS service
The idea is to not mess with...
Quite the opposite to what I thought it was:)
Filtering was disabled for the "DNS" meta app so AdGuard didn't even try to filter it and bypassed DNS requests to a non-existing DNS server instead of redirecting it to the DNS proxy.