A Pluckeye Forum

A place for Pluckeye users to chew the cud.

You are not logged in.

Announcement

This is the old forum. The new forum is at https://discourse.pluckeye.net/ .

#1 2021-06-01 13:38:41

nihad
Member
Registered: 2021-06-01
Posts: 4

pluckeye android query

Hello, I'm extremely new to pluckeye and most of it goes over my head. Anyhow I'd really appreciate some help. On pluckeye browser how do I block urls by keyword and also make exceptions to those keywords.
Ex block every url with novel in its name novelupdates etc but do not block novelfull.com
I don't know how those codes work that I've seen on other posts in this forum.
I just know the basic add rules in the pluck eye browser .
Would there be any comprehensive tutorial for android or any quick start?
I'd seen on your replies to play store reviews that the build there isn't updated and youd given a link to an apk. That link ultimately led to play store again. You see I'm very confused about all of this.
I finally reached pluckeye from a subreddit after an insane amount of research on different apps and extensions to block bas sites
I would really appreciate your help. Thanks

Offline

#2 2021-06-01 17:03:36

jon
Administrator
Registered: 2017-01-10
Posts: 525

Re: pluckeye android query

Ex block every url with novel in its name novelupdates etc but do not block novelfull.com

Pluckeye does not support that.

Would there be any comprehensive tutorial for android or any quick start?

https://manual.pluckeye.net/what-is-pluckeye is close.  It shows the desktop, but Pluckeye on Android is similar.

I'd seen on your replies to play store reviews that the build there isn't updated and youd given a link to an apk. That link ultimately led to play store again. You see I'm very confused about all of this.

Can you provide the url that links away from the Play Store?  I'd like to update it.

At one point in time (actually for over a year), the Play Store version was old and I couldn't update it, so I told people who wanted a newer version of Pluckeye where they could get it.  But that has since changed, and the Play Store has up-to-date Pluckeye for Android.

Offline

#3 2021-06-01 17:57:15

nihad
Member
Registered: 2021-06-01
Posts: 4

Re: pluckeye android query

Okay uh like block urls by keywords but also have a white list that overrides the keywords only to the extent of the list
Or even just block urls by keywords is enough. Is something like that possible?

Last edited by nihad (2021-06-02 00:22:50)

Offline

#4 2021-06-01 19:36:13

jon
Administrator
Registered: 2017-01-10
Posts: 525

Re: pluckeye android query

nihad wrote:

It's just pluckeye.net/android.html

https://www.pluckeye.net/android.html does not point a user away from the Play Store.

Before you post the url I'm asking for, be sure to read https://forum.pluckeye.net/misc.php?action=rules .

Offline

#5 2021-06-01 19:38:04

jon
Administrator
Registered: 2017-01-10
Posts: 525

Re: pluckeye android query

nihad wrote:

block urls by keywords is enough

Sounds like https://manual.pluckeye.net/flee .  See also https://manual.pluckeye.net/how-to-block-only-bad-sites .

Offline

#6 2021-06-02 11:00:47

nihad
Member
Registered: 2021-06-01
Posts: 4

Re: pluckeye android query

Hello again. Regarding dns in android, I've been researching a lot and so far have had no luck whatsoever. So I use the cleanbrowsing adult filter in private dns on my phone. Problem is it's basically useless since I can easily just turn it back to automatic. So I started searching for good appblocks and applocks to completely lock my device settings but none of them work well enough. All of them haev loopholes and I asked all their developers if they could password protecte just private DNS in wifi and connections on my android device settings. None of them did. One developer for "lock me out" mangaed to password protect his app from deletion in the device settings itself so this led me to think it's possible to password protect private dns as well. Can you help me with this? Like do you know of any apps that can password protect private dns or somehow lock dns settings ik android? I even tried cleanbrowsing vpn but that too can be easily disabled in device settings by going to vpn and clicking on forget vpn all while the app itself is pin protected which is of no use. Id seen dns enforcement but it's only for computer. Private dns and vpn are the only viables as they block both wifi and mobile data from bad sites. If you've anything please help me out.

Offline

#7 2021-06-04 09:04:43

jon
Administrator
Registered: 2017-01-10
Posts: 525

Re: pluckeye android query

What version of Android are you using?

Have you tried any/all of the products on https://manual.pluckeye.net/android ?

Feel free to private message me to let me know what ones don't work (and exactly why they don't work) so I can update the manual.

Offline

#8 2021-08-11 22:49:31

KingXanthar
Member
Registered: 2021-01-29
Posts: 5

Re: pluckeye android query

nihad wrote:

Regarding dns in android, I've been researching a lot and so far have had no luck whatsoever...

I have gone down this rabbit hole myself and can offer this advice:

Here is a tip for Android users out there. A much more robust solution and not too difficult to setup. The approach is to go the route of device policy management. In this instance you do not need any enterprise hosted solutions, but only the Test DPC app (github / googlesamples / android-testdpc. - Connect to preview  It can be downloaded from the Play Store. It is basically an app provided by Google to help developers see how their apps work in the context of a restricted device. It is also an app to showcase the latest in Android Enterprise management.

Steps Summary:

Install and provision Test DPC as a device owner. This will give you more control over restrictions. If you do not want to wipe your device before provisioning, you can use adb to programmatically set Test DPC as device owner. See the GitHub link above for instructions.

Set profile settings within Test DPC app as desired

Lock usage of Test DPC app through a robust app locker. This step insures your settings made within Test DPC cannot be changed. The app locker needs to prevent the user from removing it as an admin app after that access has been granted. Truple Web Filter for example prevents this change once the filter has been enabled.

As you can see from the list of some of the useful settings below, this approach is more akin to hardening than a simple app locker app that likely has many workarounds. Big tech companies obviously are addressing parental controls as an afterthought, but where they are focusing their efforts is on enterprise. That is where the money is. Fortunately for us, many of the features developed for enterprise are exactly what a parent or individual is looking for in order to harden their devices against unwanted content and workarounds. Now the trick is for us consumers to voice our desire to have some of these features packaged in a more consumer friendly format. We may never see that request fulfilled, but tech savvy individuals can make due with using enterprise technologies in a consumer/home environment.

An additional approach well beyond the scope of the Test DPC app is for those that are SUPER tech savvy would be to fork your own version of the Android Open Source Project (AOSP). Many of the enterprise configurations can be baked directly into the operating system through the use of configuration files. This would provide consumers a potentially simpler way to get devices that are hardened out of the box against undesired content as well as prevent circumvention of restrictions which come in a variety of ways unknown to most parents and individuals. Just some musings and tips here!

Here is a list of some useful settings to use in the Test DPC app (not their exact names):
Block UNinstallation of select apps, block INstallation of any app, block INstallation of third party apps and APKs, enforce private DNS settings (CleanBrowsing), block System WebView if you use want to use a restricted browser without workarounds (installing a new WebView is possible, but technically challenging), block VPN usage, disable ADB debugging and developer settings, prevent factory resetting of device, block app stores (not necessarily needed if you already block installation of apps), prevent multi user support and new user creation, disallow safe mode, suspend or hide certain apps you want to keep on the device, but only use temporarily when unlocking restrictions through Test DPC.

My last note here is that, in terms of comprehensive solutions such as Pluckeye, the only other options I found were https proxy, tools like browsh, and DNS whitelist only mode. https proxies I hit a wall on in terms of enforcement on Android. There is a way to set a global https proxy on Android through the Test DPC app, but it is only guaranteed to work on the browsers and not other apps. My other thought was to install a proxy on a VPN, but then my head exploded with the confusion. Browsh is a terminal browser that pixelates all images and video to save on bandwidth. I guess it could be used and all other browsers blocked, but I am not sure of the full featured functionality or security of the browser. DNS whitelist only mode works great so far, but then if one has a work computer, your whitelist would need to grow over time. Luckily CleanBrowsing DNS has an API where you can just call a URL with the CURL command and a site could be added to one of your whitelists. Using delayed-admin for Linux, I thought of storing the API credentials in a file locked under root permissions and then I could add to the whitelist only on a delay. That would make maintaining your own whitelists a lot easier.

In summary, you have to get pretty creative with this stuff, and Pluckeye is doing just that. I just wish it was not an uphill battle against the tech giants who are nonplussed with the whole tech health situation.


lumber

Offline

#9 2021-08-12 01:28:14

jon
Administrator
Registered: 2017-01-10
Posts: 525

Re: pluckeye android query

Recommended read: https://docs.pluckeye.net/android.html# … om-android .

I've removed the stock Chrome, YouTube, and Email from my phone, and I love it.

Offline

#10 2021-08-12 02:54:18

sonicsid
Member
Registered: 2021-05-11
Posts: 43

Re: pluckeye android query

jon wrote:

Recommended read: https://docs.pluckeye.net/android.html# … om-android .

I've removed the stock Chrome, YouTube, and Email from my phone, and I love it.

Haha, did you get the link to the XDA dev article from the subreddit? I posted it there a couple of days ago. :D Was planning to talk about it here as well but you beat me to it.

I went the conventional way (AppLock + Pluckeye) first, then realised that I don't need a browser on my android at all so got rid of Pluckeye, then found bypasses in the AppLock so got rid of it as well and was thinking of rooting my phone when I stumbled upon that article.

Everything did work as expected. However, when I tried to reinstall the Play Store to update WhatsApp the reinstall commands did not work for my device.

If you need an app, don't bother reinstalling the Play Store using adb commands. You can download its APK from some fairly trustworthy source (e.g. apkmirror.com) on some other device, send it to your phone and install it the regular way. To delay the process, one could simply block apkmirror.com.

Alternatively, if someone needs to update/ install multiple apps and/or isn't sure if apkmirror's APKs would work on his device (e.g. if it runs a rather old version of Android), it would be less cumbersome to get the Aurora Store instead (auroraoss.com) by following a similar procedure as above. It provides an interface similar to the Play Store and everything is device-specific. You can use it without needing to log into your Google account. It is safe since it gets all its packages from the same source as the Play Store iirc. This should only be done in a moment of strength, of course.

Perhaps you should mention the above on https://docs.pluckeye.net/android.html# … om-android as well. Also, "block program:adb.exe" works too.

Offline

Board footer

Powered by FluxBB