Is this possible on any modern day phone or tablet? Selfhosting as made me very privacy-consciouss and am concerned about my iphone.

  • NeoNachtwaechter@lemmy.world
    link
    fedilink
    English
    arrow-up
    36
    arrow-down
    1
    ·
    edit-2
    10 days ago

    Yes. Firewalls.

    With an iPhone, however, you are screwed. Apple won’t let you do what you are looking for.

    • 1024_Kibibytes@lemm.ee
      link
      fedilink
      English
      arrow-up
      12
      ·
      10 days ago

      This is a good question. On your home network, that’s pretty easy. On other networks, setting up a VPN that tunnels to your network seems like it should work.

      • ComradeMiao@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 days ago

        Oh true! What an obvious answer. I could run it to my home adguard via tailscale. What about gps though…

        • bobs_monkey@lemm.ee
          link
          fedilink
          English
          arrow-up
          8
          ·
          10 days ago

          GPS is kind of a tossup since your cellular provider can just as easily triangulate your position with their towers, and there is no escaping that outside of putting your phone in a faraday cage.

          • ComradeMiao@lemmy.worldOP
            link
            fedilink
            English
            arrow-up
            2
            ·
            10 days ago

            Good point. Wish there was a way to have a device that could only access my selfhosted applications then totally block all other tracking. I did the vpn route just now. Thanks for that tip!

            • BearOfaTime@lemm.ee
              link
              fedilink
              English
              arrow-up
              1
              ·
              10 days ago

              Cell tracking is external to the phone. It’s done by the towers - they know signal strength, and by using known tables of that data, cell providers know pretty accurately where your phone is.

              To block this you’d need a device that lacks any cellular technology whatsoever. Wifi only.

              And that has the same issues, especially with companies like Comcast/Xfiniti using their cable modems to track all the devices around them, even if you don’t connect to them.

            • Petter1@lemm.ee
              link
              fedilink
              English
              arrow-up
              1
              ·
              10 days ago

              If route all data through VPN and drop the unwanted packages in the firewall at home, you achieve this. But apple is a bitch and ignore VPN (and even DNS) for own domains.

      • iii@mander.xyz
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 days ago

        Take a look at “Rethink: DNS + firewall + VPN”. It is available through FDroid

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    10 days ago

    Guarantee? You’d have to open it up and disable the cellular radio. The OS can override any settings you make.

  • henfredemars@infosec.pub
    link
    fedilink
    English
    arrow-up
    9
    ·
    10 days ago

    Maybe I’m being stupid but a trivial way to ensure this is just don’t connect it to the Internet in any way. No SIM card. Cut it off from the Internet after setup, and only connect to a LAN with your chosen services all physically isolated from any internet machines.

  • Celestus@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    10 days ago

    Remove the SIM card to ensure it doesn’t communicate with a cellular carrier. Then go into the settings for your specific WiFi network, configure IP address manually, and remove the entry for “Router” to prevent it from talking to the Internet

  • undefined@lemmy.hogru.ch
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    10 days ago

    One thing I want to bring up just so you’re conscious of it is WiFi calling.

    I currently use Tailscale and a sophisticated setup to route traffic via commercial VPNs. I also do a ton of DNS ad/tracking blocking which Tailscale wasn’t really designed for (and requires a rat’s nest of routing, iptables and the like).

    I’ve noticed I never receive incoming calls now even while attempting to send traffic to my carrier’s WiFi calling server (it’s just another traditional VPN server at a technical level) through the nearest Tailscale exit node.

    All this is to say, if you want WiFi calling to work you should consider this. I believe it’s the same for Android and iPhone.

    As for the traditional VPN bit I kind of discovered this a few years ago when using one of those mobile cellular gateways you can plug into your LAN (I lived in a dead zone). When looking up my current carrier’s WiFi calling server (a different carrier) I realized the port matches the same VPN thing they were doing on the cellular gateway, so I think it’s fairly common for wireless carriers to just use a VPN to get you into their backend.

  • mspencer712@programming.dev
    link
    fedilink
    English
    arrow-up
    1
    ·
    10 days ago

    I have an iPhone and a gl.inet gl-e750 portable cell router, and my SIM card stays in the router. I don’t actually restrict my phone the way you’re talking about, but this gives me vpn to my home network without needing the vpn running on each client device. And if I wanted to block connections to big tech company services, I could do that.