Skip to main content

How to Block Jio from Showing Ads on your Android Phone | -CyberLuC

How to Block Jio from Showing Ads on your Android Phone

Ever since I added the Reliance Jio 4G SIM on my Android phone, I’ve been bombarded with fullscreen overlay ads. The ads appear intermittently but they’ll almost always show up after you disconnect a phone call or when you are charging the device.

Yes, I’m talking about those random full-screen advertisements which pop up even when a Jio app is not active in the background on your Android phone.

Jio’s apps have cunningly enabled a permission which essentially allows themselves to overlay content on any other application. Therefore, it doesn’t matter if you are using them or not. The fix is quite straightforward, though. You merely need to disable the permission setting for each app that belongs to Jio’s suite of services such as JioMusic, JioTV, JioCinema, and others. Unfortunately, you’ll have to repeat the process for every one of them.

I use a limited number of Android apps from known developers and was fairly certain that adware was related to the Jio phone service. After fiddling with every possible setting inside Android to disable the ads, I turned to Twitter for help.You can read the entire Twitter thread or here’s a quickly summary:
Uninstall MyJio, Jio 4G Voice and all other Jio apps.  
          
Revoke all permissions of Jio apps. Long press the app icon, press the info button, go to App Permission and uncheck everything. Also turn off the “draw over the apps” permission for Jio apps.

For Android Oreo or later, go to Settings > Apps > MyJio and turn off the “App can appear on top” setting. You probably need to do this for every Jio app on the device.

Root the phone and install AdAway, an ad block that uses the hosts file to block specific hostnames and IP addresses.

Use Greenify to hibernate all the Jio apps and prevent the app from running in the background.

Disable ‘Telephone’ access for all Jio apps. Even Jio Mags has default access to ‘Telephone’!

Toggle background data to disable data access for all Jio related apps.

Unfortunately, none of these suggestions worked.

Meanwhile, the Jio team contacted me after seeing the tweet and asked for the IMEI number of the phone. 

A week later, I got a call from the Jio support team saying that the problem should be resolved.

Yes, I was no longer getting any pop-up ads on my phone despite having all the Jio apps as before. What changed? It turned out, the Jio support representative told me, that these ads can only be disabled by Jio for the requested phone number on the server side.

Comments

Popular posts from this blog

Top 5 Website Vulnerability Scanning Tools [New Listing 2018] -CyberLuC

Top 5 Website Vulnerability Scanning Tools [New Listing 2018] -CyberLuC This is why security testing of web applications is very important because In the past, many popular websites have been hacked. Hackers are now active and always try to hack websites and leak data.   And here comes the role of web application security scanners. Web Application Security Scanner is a software program which performs automatic black box testing on a web application and identifies security vulnerabilities. Scanners do not access the source code, they only perform functional testing and try to find security vulnerabilities. The moment our world went online and enterprises started conducting their businesses using websites, they became the primary targets for hackers. The situation worsened with the  emergence of Content Management System(s) (CMS)  – like WordPress, Joomla, Drupal etc., – which while offering an easy way to build (as well as customize) websites, left...

Top 5 Most Popular and Best Cyber Forensics Tools | -CyberLuC

Top 5 Most Popular and Best Cyber Forensics Tools The art of Cyber forensic investigation is quite complex and requires rigorous precision in following every investigative step from Acquisition to Analysis & Reporting. Experts now face the need for dependable tools that help them to do so, from the beginning. Every investigation requires usage of multiple tools, dependence on a sole tool causes the investigation to lose its flexibility and makes it prone towards ambiguity.   Cyber forensic: As the title says, it is collecting evidence for investigation after an unwanted activity has occurred. Cyber/Computer Forensics is a department that comes under Digital Forensic Science for improving cyber security Here are top 5 cyber forensic tools preferred by specialists and investigators around the world. So what are the tools used by these professionals? Here’s a list of top 5 tools  used with a brief description and key features. #1)Pro Disc...

2018’s Most Dangerous Cyber Threats| -CyberLuC

2018’s Most Dangero us Cyber Threats The year 2017 witnessed some of the biggest cyber attacks of all times. This includes WannaCry Cyber Attack propelled by North Korea targeting more than 250,000 computers worldwide, NotPetya cyber attack on companies operating in Ukraine & Russia and the much-publicized Equifax data breach which even led to the resignation of the CEO after data of more than 143 million US Citizens was found to be compromised. And according to Gartner, Information security spending is said to reach $86.4 billion by the end of 2017 and will probably cross the $110 billion mark by the end of next year. 2018 is a new year, and with it come newer, more advanced cyber threats. A growing set of efforts against individuals, businesses, and international security, cyber-attacks threaten systems and devices that people use every day, from smartphones to the websites you check before bed every night, to your work computer. Cyber threats have a variety of aim...