Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
And yet that is exactly how the App Store process works and always has. You ask for an additional entitlement (without it, you can't use the API), and App Review presumably applies extra scrutiny.
AFAIK, entitlements for iOS apps only allows them to do what the apps wants to for itself without affecting other apps. What you and others are suggesting is to create entitlements that are system wide. Again, this is not a good idea IMHO.

macOS's security model no longer looks like that. It relies heavily on mechanisms such as TCC and sandboxing, which apply even if you aren't root. The notion that a non-root app should feel free to muck around with your entire home directory was fine in the 1970s but isn't today.
It is enhanced, but fundamentally it is still based on user account rights. A use with roots access can terminate processes of other users. Actually since the 70s, Unix is already enforcing these rights (e.g. roots vs normal users) as it is designed with multi user access in mind. It is the normal personal computer OSes, e.g. Apple II, MSDOS, Windows 95 that give full access. And look what happened when Internet access became prevalent. OS folks learns from these mistakes. That is how OSes evolved to what it is today.

iOS has root just like macOS does.
And you point being? I said that iOS does not have the concept of user accounts and I meant it for users using iOS devices. I think you know what I meant. Nice redirection.

It's not relevant. Open-source VPN apps for iOS exist if that's your concern.
Netfilter, as I explained it, is a sub-system of Linux. It is not an app. Not sure if you understood what I wrote. FYI, iOS is based off Darwin kernel, which is also open-sourced. I'm not sure what you even mention open-sourced VPN apps. Scrathing my head here.

And Apple disagrees and offers broader use cases for VPNs.

I'm not sure why some of you keep arguing this since it's the entire premise of this article. If you think VPNs should only be for giving access to private resources, that's fine. Connect to the VPN, you get access. Disconnect, the routes get removed and existing connections won't work any more. This discussion is not about that.
What did Apple disagrees with in your opinion? Apple only provides APIs for developers to implement their VPN protocols. That's about it. I don't think Apple has any stance on how you make use of the VPN services.

Disconnecting existing connections willy-nilly may have bad consequences for existing apps, and I'm saying that allowing just about any app to be able to do that is bad. So far I do not see any argument indicating that how this is not going to be exploited. Do you have any?

And I said I think the entire episode is making a mountain out of a molehill.

There is a privacy aspect in that it obscures your original location.
I don't think you understand what I'm explaining to you in my previous post to yourself. By using a VPN service, all you are doing is transferring the knowledge of your location from your ISP to your VPN service provider. How is that obscuring your original location. If the argument is obscuring from your ISP, it is silly. Your ISP already knows where you are.
 
  • Haha
Reactions: Babygotfont
Ah, well that probably explains why on my last trip to *cough* a country that shall remain unnamed, but where the Fruit company has many things manufactured *cough* my VPN went tits up and I was unable to use my favourite search engine.

FFS Apple!
It doesn’t explain that!
 
  • Angry
Reactions: Babygotfont
I remember this getting reported on a couple years ago, and never getting an update. I just assumed it had been fixed.

I’m so glad my privacy has been compromised for the last 2.5 years and still is being compromised while Apple knows about it and does nothing about it.
Hey relax, APple is the company that cares about your "privacy" and "security" more than any other company in the world. We absolutely need to keep side loading out, and the walled garden in, so that we are all safe from those nasty outsiders who would corrupt your phone. If you don't believe me, just listen to all the fans on this forum that will tell you every time Europe proposes a new law :D
 
Anybody knows if this bug only affects 3rd party VPN solutions or also the iOS solution which may be configured in the settings app? Did read the blog post, but this wasn‘t answered satisfyingly.
 
Classic Bait & Switch.
Bait with notions of privacy, safety, and no ads.
And look at what we get now.
 
I get the feeling corporate users of VPN's will be getting their lawyers to look over the T&C's of the VPN's because they would have been paying for a service which is supposed to protect their clients privacy and security but due to an ios bug this is not the case. How many VPN's have told customers about the ios bug that leaks network traffic? Could be many lawsuits against VPN's in the pipeline.
 
I get the feeling corporate users of VPN's will be getting their lawyers to look over the T&C's of the VPN's because they would have been paying for a service which is supposed to protect their clients privacy and security but due to an ios bug this is not the case. How many VPN's have told customers about the ios bug that leaks network traffic? Could be many lawsuits against VPN's in the pipeline.

What corporate users mainly care about is a different scenario: you connect to the VPN, and gain access to corporate resources; you disconnect, and lose that access. Presumably, this does work correctly.

It's the opposite that supposedly doesn't work reliably: killing existing connections when connecting to a VPN. This isn't as important a scenario for corporate use. (It might still be desired by IT, such as to ensure all traffic can be inspected by them. But that's something Apple might frown upon anyway, and might not be particularly inclined to support.)
 
You know that the information leaving the VPN provider network will be equivalent to as if it’s leaving the device’s network provider? Using a VPN provider for Internet access only encrypts the data between device and VPN provider’s network. Once the data leaves the VPN provider network, if it’s not secured (e.g. with TLS 1.2) it’ll be in the clear.

How is using a VPN service for Internet access any more secure? It sure is slower tho., and battery life will be worst.
The difference is that my VPN server is in a different country. Again, in the UK the government has passed laws that allow for blanket surveillance, requiring ISP's to save domain names of every site visited, whether you are suspected of a crime or not. So when I use a VPN, I assume all that the government gets is a foreign IP address and a domain name that indicates it is a VPN, but that's it. Also, snooping is not just done by governments. Thus, I want Apple to provide maximum security and privacy. I am not a security expert - just paranoid. I've heard too many stories from friends who have survived authoritarian regimes. :)
 
My understanding was that OS based was currently corporate only.
I am not aware of any that can be gotten via the App Store.

You can use a few built-in protocols (L2TP, IKE, and Cisco's variant of IKE), or you can install additional protocols via the App Store (e.g., OpenVPN). Neither is enterprise-specific, although MDMs (which are typically used in enterprise scenarios, but also, say, schools) add the ability to deploy a VPN config across multiple devices and manage that centrally.
 
I also question how many programs can ignore rules of the device. Reddit app for example has cellular data use turned off. Without fail, I'm out in a parking lot or large park, and suddenly my watch could buzz a notification of a thread I might be interested in, including graphic. How? Check for wifi connections... None established. Everything secured in the area. Nothing I've ever attempted to connect to. Maybe I'll just leave wifi off when leaving the house to confirm behavior, but always disturbing.
Heh.. I've been going back and forth about getting the Reddit app, but ultimately didn't. More so I just forgot about it, and use web to do that. Otherwise, most of my browsing is on a desktop computer.

On a related note, people in the past would just click "OK" for privacy dialog/popup windows. I have a feeling that sort of thing continues to this day on mobile... they DL an app, but don't bother reading the privacy statements and policies set forth in the mobile stores! :D :O
 
@bobcomer @chucker23n1

Okay - sounds more like terminology. My misunderstanding.
My use has been my general use VPN (ex: ProtonVPN) and the other for Remote Access (employer)
No prob. Remote access can work for connecting to your home and some enterprises might use a commercial VPN like ProtonVPN when in foreign countries. The concept is really versatile and can be used for multiple things.
 
  • Like
Reactions: dk001
What corporate users mainly care about is a different scenario: you connect to the VPN, and gain access to corporate resources; you disconnect, and lose that access. Presumably, this does work correctly.

It's the opposite that supposedly doesn't work reliably: killing existing connections when connecting to a VPN. This isn't as important a scenario for corporate use. (It might still be desired by IT, such as to ensure all traffic can be inspected by them. But that's something Apple might frown upon anyway, and might not be particularly inclined to support.)
I'd also add here that sometimes, corporations DON'T want all the traffic going through the VPN tunnel!

For example, say you have a home user who wishes to print to their own networked printer(s) while connected to the office via VPN. They'll need a "split tunnel" configuration that purposely routes traffic destined for their local network's IP address range outside the VPN tunnel.
 
  • Angry
Reactions: Babygotfont
I'd also add here that sometimes, corporations DON'T want all the traffic going through the VPN tunnel!

For example, say you have a home user who wishes to print to their own networked printer(s) while connected to the office via VPN. They'll need a "split tunnel" configuration that purposely routes traffic destined for their local network's IP address range outside the VPN tunnel.

True, but that’s easy enough, and I don’t think there’s any problem with that in iOS. DNS is a bit tricky, but routing is rather simple.
 
  • Like
Reactions: bobcomer
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.