A few days ago, I got a spam e-mail from Adguard, promoting their VPN. Now I'm getting them every day. Anybody else? I don't know how they got my address. It doesn't include my name, so it must have been purchased or harvested. I do have Adguard for Safari installed, but I don't see how they could have got it from there.
Today we were notified about this post on r/macapps/ subreddit where we learned about SetApp alleging that AdGuard connects to Russian servers, and thus should be removed from their apps collection. It means that SetApp customers will not be able to use SetApp subscription to unlock AdGuard premium features as before. It's worth noting that we received no notifications from SetApp about that and learned about the situation from the post, just as everybody else.
Just one last thing about this: I'd be glad if anyone from SetApp could supply any technical details on what lead them to this thought about Russian servers. The only idea I have is that the local.adguard.org domain somehow mislead them. There's an article in our Knowledge base that explains the purpose of this fictional domain and how it can't be located in Russia as it doesn't really exist.
Our history is public knowledge. AdGuard was founded in 2009 in Moscow. Later we moved our HQ to Cyprus as a conscious decision, in order to operate under the EU law. However, historically the majority of AdGuard developers and other employees have been working from Moscow. This has been true up until recently, when many of our employees are relocating to Cyprus and other countries. Not to mention that we had employees working for AdGuard from other parts of the world, including Ukraine, even prior to the current events. I guess I am writing this to emphasize that we view ourselves as a multinational company that respects European laws and is not tied to any single country, physically or in any other way.
I honestly don't really know the point of SSL filtering anyway...makes sense for content blocking, but for an anti-virus the real-time scanner should be picking up everything being accessed anyway, regardless of where it came from. Plus Firefox already comes safe browsing blocklists from Google and Mozilla.
I doubt it. I'm using an old AMD A6 from 2011 and I don't have any issues with ssl scanning. Video playback with ssl scanning and even parental control scanning enabled is still smooth. Normal non video web browsing is also not affected, pages load fin,e just as they do with ssl scanning disabled.
I don't seem to be having any more issues now. I added the entire ESET directory to the advanced settings of Adguard so all the programs in that path are excluded entirely from Adguard's BFE filters. I also took the Adguard service off of ESET's SSL/TLS filtering list, and set ESET to ignore Adguard's certificate.
When we turned our focus from NetChart to AdGuard, we performed one of the most radical pivots in the history of startups. At the end of 2011, we launched AdGuard as a paid software application for Windows.
However, at the same time, we ran out of investment capital, and so we decided to earn money as a web design agency. There were only three men left from the original team and we moved from an office to a tiny apartment in a small city near Moscow.
Several months after the first official AdGuard release we released a totally ill-prepared update. We received a fair share of embarrassment from this, so we started a beta testing program with the participation of our users.
The base interface language from now on was to be English. This was a truly significant shift, crucial for our success. There are multiple important benefits from this move. First of all, for a native speaker, it was easy to notice that the text was translated from another language, even if the translator was also a skilled, or even a native, English speaker. Also, using English as the base language allowed us to more easily translate AdGuard into multiple other languages (numbering in the dozens at this time). Using English as the primary language helps us to speed up development as it eliminates an extra step (translating into English, then into other languages) that was required earlier.
A New HQ. We opened a new office in Nicosia on Cyprus and moved the head company there (Adguard Software Ltd). Cyprus is in the European Union, and EU privacy laws make us (as an ad blocker) feel much more comfortable than any other place. We are slowly becoming more "global." There are now people from Slovakia, Russia, Poland, Ukraine, Germany, South Korea and the UK on our team.
Cryptojacking fever started this September, and it does not show any signs that it will end soon. Websites use their audiences' computers to earn money by mining cryptocurrencies. At first, we had welcomed it as an alternative to ads, but the massive misuse of browser mining made us experts in crypto-jacking control and research. We can state now that AdGuard has become one of the best tools to protect you from this new threat.
Considering flashing a TL-WDR3600 with OpenWRT but would first like to know from someone who is using it how much free RAM it has with a base OpenWRT installation - is there enough space left for an Adguard install?
Even luci-app-adblock, which is much more moderate in terms of system requirements than adguard, is quite challenged to cope with 128 MB RAM devices, at least once you add any sizeable blocklists. It's safe to assume that this wouldn't be a good match.
But yeah I agree with everything else, stagnation is inevitable for any service and not to say Adguard DNS is just bad but from my experience I haven't really seen anything truly groundbreaking to care. But I am someone who likes stability and simplicity over everything else.
Its just that NextDNS should add the basic features that have been requested for a while now like dark mode and control directly from the logs and other stuff that has been requested for a while now.
I've tried everything from Adguard to ControlD to a few DNS providers that are free with at least a choice of filters like Aha and Rethink, with all the known options for no settings DNS servers as well.
Just a while after I switched from monthly to yearly Nextdns subsciption, I became suddenly tempted to know how the product is doing (improving) for the money, only to be googled to this forum and found this thread. Ironic.
Calendar reminder set. If nothing happens in this year, it will be enough to see this product as dying from inside and I will look for alternative in order not to be suprised when this website will say some sort of apologize for end of service, one day.
Pierre Cartier this claim is not true. It might be hard to distinguish critics from trolls in same forum when the heads are hot. I am longtime NextDNS user, not considering a switch. You can check my forum login email to be the same as the account one.
If you do need VPN policies, here is an article on adding a Pi Zero to the USB port to keep adguardhome available for DNSMasq to forward to (I mentioned it before but forgot where I read the article).
I just read about AdGuard Home and it seems to offer the same functionality as PiHole plus or minus a few features. See here -adguard-home/
It's awefull curious too see that the web UI looks quite a bit like the UI for PiHole. I'd like to see a developer look over the source code to see if there is some GPL violation or use of other people's work. You can view the source code here GitHub - AdguardTeam/AdGuardHome: Network-wide ads & trackers blocking DNS server
Thanks
My 2 cents: the developers should consider taking a look at the product, and implement some of the feature requests from the past (safe search, better control of lists + description, comments for whitelisted entries, ...) Adguardhome may become a serious competitor (but currently isn't).
As you can probably tell from the above screenshot, AdGuard Home allows for you to have multiple configured DNS servers, and then to have difference options as to how those servers as used. The other great thing is that you can mix and match different DNS protocols (for example have a DNS-over-TLS and DNS-over-HTTPS).
thank you for the instructions. I wonder how to do this if I use 2 different adguard home instances? My router uses the ip addresses for 2 differet pi's that run adguard. in case ones down, i installed unbound on one of those with 127.0.0.1:5335 in the adguard running on the same pi. as for the other pi with adguard, i either need another instance of unbound? or use ipadderssofpiwithunbound:5335???
I am currently using AdGuard home behind a traefik instance (no k8s, just docker). I was trying to set it up, so it displays the clients IP addresses, instead of just the docker IP of the traefik instance.
In this guide, they have an example of how to configure it using nginx proxy. I put the docker network (172.17.0.0/16) in the trusted_proxies list, since the IP of traefik may change on a restart. They also mention that AdGuard looks at the X-Forwarded-For and X-Real-IP header, to see from where the request came. As much as I understood, traefik automatically sets the X-Forwarded-For header (FAQ). But some resources say that I need to set the forwardedHeaders options for my entry points(1, 2). I used this option when I was having requests coming from cloudflare`s proxies, so that I can retain the source IP of the request, but I don't know if I need this here too?
I deployed ADGuard Home in my network and I was planning to make all clients use ADGuard as DNS Server and let ADGuard forward query to Windows DNS Server for LAN domain and to public external DNS Server for others names. So I made ADGuard upstream servers configuration similar to
```
[/lan.mycompany.com/]10.20.50.33
1.1.1.1
```
But when from a Windows computer on the lan (whose DNS domain suffix is **lan.mycompany.com**) I try make a name query for, say, www.google.com Opens a new window, it happens that the os resolver send to ADGuard a query for www.google.com.lan.mycompany.com Opens a new window and later www.google.com.mycompany.com Opens a new window.
Both queries goes, I suppose, from ADGuard to Windows DNS Server who can't solve internally and, I suppose, forward to public DNS server: the first one is not resolved externally, but the second one is resolved, because *.mycompany.com is registered and point to my public ip.
Why Windows DNS Server try to solve externally a query for an "internal" zone instead of returning failure?