Skip to content

Commit

Permalink
automatically update translations
Browse files Browse the repository at this point in the history
  • Loading branch information
el-termikael authored Jul 19, 2023
1 parent a5eeb43 commit 648e824
Show file tree
Hide file tree
Showing 863 changed files with 24,118 additions and 6,764 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -9,33 +9,19 @@ This article covers AdGuard for Android, a multifunctional ad blocker that prote

:::

Sometimes you may notice that, according to Android built-in statistics, AdGuard consumes a lot of traffic and/or battery resource.
On Android devices running OS 6 and earlier, built-in statistics often attributed high data and/or battery usage to AdGuard. This was because AdGuard counted all the traffic it filtered from various apps. As a result, AdGuard's share of total data and battery usage was overstated, while other apps were understated.

Both these problems are two sides of the same coin. Since in the process of filtering all the mobile traffic goes through AdGuard, Android decides that it is AdGuard that consumes it all. In reality, of course, it is not true.
With OS 7, however, this scenario has improved. Now the data reflected in Android's built-in data usage statistics is very close to reality, although there are minor discrepancies in the battery usage data.

Battery and traffic consumption shown in devices statistics **do not represent the facts**. The thing is, Android attributes all of the WiFi and Mobile traffic to AdGuard, which was in fact consumed by other apps. Due to this, AdGuards real share of total consumed traffic and battery resource increases, and the share of other apps, on the contrary, decreases.
Nevertheless, AdGuard users can always get a true picture of the situation on the *Battery usage* screen.

### Own battery usage stats screen

To mitigate this misconception, we added a new screen called 'Battery usage'. You can access it by tapping on the battery icon in the top right corner of the main screen.
You can access it by navigating to *Statistics**Battery usage*.

![Battery stats *mobile_border](https://cdn.adtidy.org/content/kb/ad_blocker/android/solving_problems/battery/batterystats.png)
![Battery stats *mobile_border](https://cdn.adtidy.org/content/articles/battery/1.png)

Inside you will find a chart that shows the AdGuard battery resource consumption within the last 24 hours, with an option to get more detailed hour-to-hour data by tapping on the dots on the chart. Besides that, there’s also a numeric breakdown of the relevant data and a short technical explanation.

### Real example

On the screenshots below you can see the battery resource consumption statistics for a night and subsequent morning:

![Battery 1 *mobile](https://cdn.adtidy.org/public/Adguard/kb/PicturesEN/battery_1.png) ![Battery 2 *mobile](https://cdn.adtidy.org/public/Adguard/kb/PicturesEN/battery_2.png) ![Battery 3 *mobile](https://cdn.adtidy.org/public/Adguard/kb/PicturesEN/battery_3.png)

From these screenshots you can see that:

1. AdGuard, as expected, is at the top of the chart. This is generally typical for smartphones (and not at all for tablets without 4G, since WiFi is much less 'costly' in terms of battery consumption).

2. Pay attention to the number of sent Mobile and WiFi packages, which were attributed to AdGuard (Mobile packets sent и Wi-Fi packets sent) on the second screenshot.

3. On the third screenshot are stats for one of the real traffic consumers, Yandex.Browser. It was not attributed almost any traffic at all, while in reality 70% of the total traffic was consumed by it.
Inside you will find a chart that shows the AdGuard battery resource consumption within the last 24 hours, with an option to get more detailed hour-to-hour data by tapping on the chart. Besides that, there’s also a numeric breakdown of the relevant data and a short technical explanation.

### How much battery resource does AdGuard really consume?

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Known compatibility issues with Android apps
sidebar_position: 15
sidebar_position: 16
---

:::info
Expand All @@ -14,49 +14,52 @@ This article covers AdGuard for Android, a multifunctional ad blocker that prote
Other VPN apps are incompatible with AdGuard running in the Local VPN filtering mode since you cannot have two active VPNs at the same time. To solve this problem we suggest you:

* use [AdGuard VPN](https://adguard-vpn.com/welcome.html) — it has Integrated mode that allows two apps to operate seamlessly
* use AdGuard in Local HTTP Proxy mode. *Please note that 'manual' HTTP Proxy mode is not supported on devices since Android 10*
* if you use a third-party VPN app, figure out whether it supports SOCKS4/SOCKS5 mode. If it does, you can configure your VPN app to work as outbound proxy and set up local outbound proxy with params from the third-party app. For instance, AdGuard can be automatically configured with 'Orbot: Proxy with Tor'
* use AdGuard in Local HTTP Proxy mode

:::caution

Please note that on Android 10 and later devices, the 'manual' HTTP proxy mode is no longer supported.

:::

* configure your VPN app to to act as an outbound proxy and set up a local outbound proxy using the parameters from the third-party app. To do this, a third-party VPN app must support SOCKS4/SOCKS5 mode. For example, AdGuard can be automatically configured with 'Orbot: Proxy with Tor'.

## Private DNS

The Private DNS feature was introduced in Android Pie. Before version Q, Private DNS didn't break AdGuard DNS filtering logic and the DNS forwarding through AdGuard worked normally. But starting from version Q, the presence of Private DNS forces apps to redirect traffic through the system resolver instead of AdGuard. See Android [devs blog](https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html) for more details.

:::tip
* To solve the problem with Private DNS, use the `$network` rule

Some device manufacturers keep Private DNS settings hidden and set 'Automatic' mode as a default one. Thus, disabling Private DNS is impossible but we can make the system think that the upstream is not valid by blocking it with a `$network` rule. For instance, if the system uses Google DNS by default, we can add rules `|8.8.4.4^$network` and `|8.8.8.8^$network` to block Google DNS.

:::

## Unsupported browsers

### UC Browsers: UC Browser, UC Browser for x86, UC Mini, UC Browser HD

To be able to filter HTTPS traffic, AdGuard requires the user to add a certificate to the device's trusted user certificates. Unfortunately, UC-family browsers don't trust user certificates, so AdGuard cannot perform HTTPS filtering there.

**Solution**
* To solve this problem, move the certificate to the system certificate store

*Requires root access*. To solve this problem, move the certificate to the system certificate store.
:::caution

### Opera mini: Opera mini, Opera mini with Yandex
Requires root access.

Opera mini drives traffic through a compression proxy by default and AdGuard is not able to decompress and filter it at the same time.

**Solution**

There is no solution at this moment.
:::

### Dolphin Browser: Dolphin Browser, Dolphin Browser Express

AdGuard cannot filter its traffic when operating in **Manual proxy mode** because this browser ignores system proxy settings.

**Solution**
* Use the **Local VPN** filtering mode to solve this problem

### Opera mini: Opera mini, Opera mini with Yandex

Opera mini drives traffic through a compression proxy by default and AdGuard is not able to decompress and filter it at the same time.

Use *Local VPN* filtering mode.
* There is no solution at this moment

### Puffin Browser: Puffin Browser, Puffin Browser Pro

Puffin Browser drives traffic through a compression proxy by default and AdGuard is not able to decompress and filter it at the same time.

**Solution**

There is no solution at this moment.
* There is no solution at this moment
Original file line number Diff line number Diff line change
Expand Up @@ -14,13 +14,13 @@ The HAR (HTTP ARchive) format is a JSON-formatted archive file for logging of a

## How to get HAR files
Sometimes we need to analyze it to block specific ads that are difficult to reproduce for some reason. To get HAR files follow these steps:
1. Open AdGuard and go to "Settings".
2. Choose "Advanced" in the menu.
3. Choose "Low Level Settings".
4. Activate "pref.har.capture" (you will have to restart the protection).
5. Now reproduce the problem - open the app, perform the necessary actions to make the ad appear.
6. Now turn "pref.har.capture" off again.
7. Go back and tap "Export logs and system info" → Save.
1. Open AdGuard and go to **Settings** (⚙ icon in the lower right corner).
2. Tap **General****Advanced****Low-level settings**.
3. Scroll down and activate **Capture HAR** in the Filtering section.
4. Open the app and perform the necessary actions to reproduce the problem.
5. Turn **Capture HAR** off.
6. Go back to **Advanced**.
7. Tap **Export logs and system info****Allow** (if necessary) → **Save**.

**Please send the file with logs (that you've got as a result) to the AdGuard support service.**

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Moving CA certificate to System store on rooted devices
sidebar_position: 13
sidebar_position: 14
---

:::info
Expand All @@ -15,11 +15,15 @@ On non-rooted devices CA certificates can be installed to the **User store**. On

However, on rooted devices, you can install the certificate to the **System store** and allow HTTPS filtering of other apps' traffic too.


Here's how to do that.

## How to install AdGuard's Certificate to System store (on a rooted device)

1. Enable HTTPS filtering in AdGuard for Android and save AdGuard's certificate to the User store (use [this instruction](../../overview#https-filtering) if needed)

> From AdGuard for Android v4.1 and after users can install two certificates to the User store, which will help to filter websites in Chrome browser.
2. Go to **AdGuard app****Menu** (≡) → **Settings****Network****HTTPS filtering****Security certificate** → tap “**Copy to the system store**

That is enough for older versions of Magisk.
Expand Down Expand Up @@ -52,15 +56,19 @@ In that case, proceed to steps below:

7. Reboot

![Reboot the device](https://cdn.adtidy.org/content/kb/ad_blocker/android/solving_problems/https-certificate-for-rooted/magisk-module-7.png)
![Reboot the device *mobile](https://cdn.adtidy.org/content/kb/ad_blocker/android/solving_problems/https-certificate-for-rooted/magisk-module-7.png)

If a new version of "AdGuard certificate" module comes out, repeat steps 3-7 to update the module.

The module does its work during the system boot. If your AdGuard certificate changes, you'll have to reboot the device for the new certificate to be copied to the system store.

### Bromite browser

Please note that in order for **Bromite** browser to work properly, in addition to the steps mentioned above, you need to set "Allow user certificates" in `chrome://flags` to "Enabled" state.
:::note

In order for the **Bromite** browser to work properly, in addition to the steps mentioned above, you need to set "Allow user certificates" in `chrome://flags` to "Enabled" state.

:::

### Chrome and Chromium-based browsers

Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: How to collect a full log
title: How to collect debug logs
sidebar_position: 2
---

Expand All @@ -9,40 +9,20 @@ This article covers AdGuard for Android, a multifunctional ad blocker that prote

:::

Sometimes in order to understand a problem and fix it we need to collect **log files**, or **logs**. Basically, these files contain information about the program and it's work.
In this article, we'll guide you through the process of collecting debug logs, an essential troubleshooting step for solving complex issues that may potentially arise. Debug logs provide detailed insight into the inner workings of AdGuard for Android. If the AdGuard support team askes you to provide debug logs, simply follow these instructions.

### Collecting debug log

To collect **debug** log and send it to us you need to perform following steps:

1. Open AdGuard and go to "Settings".
1. Go to *Settings**General**Advanced*.
2. Tap *Logging level* and set it to *Debug*.
3. Reproduce the problem and try to remember the exact time it occurred.
4. Wait a while, then return to *Settings* and choose the *Support* tab. Tap *Report a bug* and complete the required fields. Don't forget to check the *Send app logs and system info* checkbox. Finally tap *Send*.

2. Choose "Advanced".
If you're interested in following the resolution of your issue and engaging in a dialogue with the developers, we recommend that you take the following steps after completing the first three:

3. Set "Logging level" to "Record everything". It's desirable to close all background apps that don't concern the problem beforehand.
4. Wait a while, then return to the *Advanced* screen and export logs via *Export logs and system info*. Then report a bug on GitHub by following these [instructions](/guides/report-bugs.md).
5. After creating an issue on GitHub, send the log file to devteam@adguard.com. Include the time of the bug and attach a link to your issue or its number (it appears as #number next to the title). Alternatively, you can upload the log file to Google Drive and send it to devteam@adguard.com. Add the file link to your GitHub issue

4. Reproduce the problem and set the logging level back to "Default". Notice the exact time when it happened.

5. Send us a message from program by choosing "Support" → "Send Feedback" in the menu. Don't forget to check the "Send detailed system info" checkbox under the text field and to include the timestamp from the step 4 into the message.

As an alternative, you can export the logs (along with the *state.txt* file that contains system information and information about AdGuard settings) directly into a local file. It can be convenient, for example, if you are having a conversation with a developer on [GitHub](https://github.com/AdguardTeam/AdguardForAndroid/issues), [forum](https://forum.adguard.com/) or on another platform.

To export logs and system information into a file, go to "Settings" — "Advanced" and tap "Export logs and system info". Select the destination folder and tap "Save".

### Collecting web requests log

To collect **web requests** log and send it to us you need to perform following steps:

1. Open AdGuard and go to "Settings".

2. Choose "Advanced".

3. Set "Logging level" to "Record web requests". It's desirable to close all background apps that don't concern the problem beforehand.

4. Reproduce the problem and set the logging level back to "Default". Notice the exact time when it happened.

5. Send us a message from program by choosing "Support" → "Send Feedback" in the menu. Don't forget to check the "Send detailed system info" checkbox under the text field and to include the timestamp from the step 4 into the message.

As an alternative, you can export the logs (along with the *state.txt* file that contains system information and information about AdGuard settings) directly into a local file. It can be convenient, for example, if you are having a conversation with a developer on [GitHub](https://github.com/AdguardTeam/AdguardForAndroid/issues), [forum](https://forum.adguard.com/) or on another platform.

To export logs and system information into a file, go to "Settings" — "Advanced" and tap "Export logs and system info". Select the destination folder and tap "Save".
Loading

0 comments on commit 648e824

Please sign in to comment.