Comment #⁨5⁩

  1. If you disable non proxied UDP (WebRTC), the loopback scanning will fail. I think the Chromium team has either changed their defaults or added a new dial after the Facebook/Yandex tracking techniques became public. Brave has tighter controls over this by default, and you can adjust it.

  2. Just disable the proxy server in your client.

  3. Private space, work profiles, separate users don't share the networking space except for a few IPCs for notifications etc. In laymen terms, an app installed in a private space uses a separate routing table and isn't routed through your admin profile VPN connection slot, and this is done by design.

Private space has a couple of VPN leak bugs here and there and you absolutely shouldn't use it for anything serious though.

My personal strategy is to use a separate Chromium based browser for anything government related. I don't install the banking apps either as i foreshadowed the observed behavior of Yandex long before it became public. For Russians specifically, disabling socks proxy isn't enough as user installed apps have greater power and can enumerate VPN servers like Max did.

Not to mention the fact you're inviting a threat actor to your device. Sandboxed, but still.

Chromium based browsers make use of Android's tight sandboxing and make it practically impossible to hack a citizen. Every major app except for taxi, car rentals and 20km/h killdozers have a mobile version counterpart.