



It falls short of instecting the contents of the requests, but it does allow the user to export lists of all DNS/HTTP requests. In that case, installing NetGuard available from F-Droid will allow the user to list and optionally block DNS/HTTP requests. "Tech" companies do not pay the costs of transferring the data/information, users foot the bill.Ī cautious user could decide that if the "tech" company will not share with her the deatils of the user's data/information being sent to the mothership, then she will just block the requests. After all, it is the user's network, it is the user's computer and it is the user's data/information, not the "tech" company's. Assuming the people running "tech" companies wants users to trust them, the user's data/information being transferred to the "tech" company should be available to the user. The part about being able to see "what they're saying" is interesting. I have not run into any problems with HSTS. Instead of Burp, I use Haproxy running in Termux. "All I want is to be able to see who my device is using my network to call, and what they're saying."
