I found that some ads are still creeping in somehow. Some ads like in-url ads using HTTPS (I mean, example.com/ad, where example.com is a useful site with example.com/goodcontent but example.com/ad is an ad url).
I have encountered this http://www.digitalinternals.com/mobile/android-sniff-http-https-traffic-without-root/490/
and also https://security.stackexchange.com/a/8309
Is it possible in Adguard to perform Man-in-the-middle attack by installing an SSL Certificate and decrypt to read the full https url and block https://youtube.com/pagead like urls?
Since proxy is something that is only available for Wifi, but Adguard uses a VPN that filters even mobile data also. The same VPN to which all the traffic is routed can decrypt to read the full URL depending upon which it can block in-url ads like https://example.com/ad.
Are there any problems employing this technique? I don't know much about Android, if the user installs a root certificate, can the certificate be useful to decrypt ad traffic also?
I have encountered this http://www.digitalinternals.com/mobile/android-sniff-http-https-traffic-without-root/490/
and also https://security.stackexchange.com/a/8309
Is it possible in Adguard to perform Man-in-the-middle attack by installing an SSL Certificate and decrypt to read the full https url and block https://youtube.com/pagead like urls?
Since proxy is something that is only available for Wifi, but Adguard uses a VPN that filters even mobile data also. The same VPN to which all the traffic is routed can decrypt to read the full URL depending upon which it can block in-url ads like https://example.com/ad.
Are there any problems employing this technique? I don't know much about Android, if the user installs a root certificate, can the certificate be useful to decrypt ad traffic also?