I’m on a rooted Samsung smartphone, running One UI 7.0 and Android 15. Not quite ready to switch to Graphene OS yet. Also, my threat model doesn’t require it. Yet. 🤣
In addition to having debloated with UAD-NG and using HaGeZi’s Ultimate DNS Blocklist in AdAway, I have also blocked:
android.clients.google.com
deviceintegritytokens-pa.googleapis.com
es11.samsungsm-ds.com
mtalk.google.com
pinning-02.secb2b.com
play-lh.googleusercontent.com
playstoregatewayadapter-pa.googleapis.com
prod-lt-playstoregatewayadapter-pa.googleapis.com
shop.line-scdn.net
I haven’t noticed any unexpected behaviors yet. I also tried blocking:
i.ytimg.com
play.googleapis.com
digitalassetlinks.googleapis.com
android.googleapis.com
But the first one is needed to load thumbnails on NewPipe and the latter three are needed to login to the Play Store whenever you want to update whatever you have installed through the Play Store - two apps in my case. I have logged out of my Google account and blocked the Play Store with a firewall and only unblock it once a month or so to update Play services and such.
Just wanted to share what can be blocked with a hosts file on a Samsung smartphone. 😊


https://f-droid.org/packages/org.adaway
Recommend going this route rather than trying to manually edit your hosts files. Makes it easier to turn off & on and whitelist domains if something breaks.
Use the rooted option, it’ll modify the hosts file for you & still let you connect to a VPN
Thanks! That’s exactly what I’m using! Sorry for the unclear post. 🙏🩵 updated it now!
No worries, thought you were doing it the hard way and wanted to save you some trouble!