Lockdown Launches First Open Source Firewall for iOS

We care more and more about the issue of security of our devices. Many of you probably have an iPhone due to the security that Apple offers us with respect to our data. And it is more than proven that Apple devices offer us that security in our privacy that other manufacturers do not offer ...

Manufacturers protect us but also developersIn the end, these are the ones who can also "play" with our data. And yes, there are also apps that can increase the security of what happens on our iPhone or iPad. Now the development team of the famous ConfirmedVPN, an open source VPN, has just launched another application with which to have an extra security on our devices: Lockdown, the new Open Source iOS firewall. After the jump we tell you more about this new firewall for iOS.

The open source VPN app we are talking about does not sound like the same, but surely duet display yes, it sounds like something else to you ... And the thing is that Lockdown is from the same company as this famous app with which to turn our iPad into an additional screen for our Mac. A team of developers led by Johnny Lin, a former iCloud engineer, who this new LockDown offers us the possibility of block any connection to any website, customize the block list, protect our privacy, and navigate faster by blocking unwanted connections.

Worth? Well, in the end it all depends on the use we make of our devices. Under my point of sighta with an iOS device we do not need any third-party app to "protect us"We do have to be aware of how we work with our devices since many times accepting all the terms and conditions of some apps is the problem of our security ...


How to rename apps on iOS and iPadOS
You are interested in:
How to rename iPhone apps
Follow us on Google News

Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.