It’s still more than other vendors and manufacturers.Apple only cares about marketing privacy, not actual privacy.
AFAIK, entitlements for iOS apps only allows them to do what the apps wants to for itself without affecting other apps. What you and others are suggesting is to create entitlements that are system wide. Again, this is not a good idea IMHO.And yet that is exactly how the App Store process works and always has. You ask for an additional entitlement (without it, you can't use the API), and App Review presumably applies extra scrutiny.
It is enhanced, but fundamentally it is still based on user account rights. A use with roots access can terminate processes of other users. Actually since the 70s, Unix is already enforcing these rights (e.g. roots vs normal users) as it is designed with multi user access in mind. It is the normal personal computer OSes, e.g. Apple II, MSDOS, Windows 95 that give full access. And look what happened when Internet access became prevalent. OS folks learns from these mistakes. That is how OSes evolved to what it is today.macOS's security model no longer looks like that. It relies heavily on mechanisms such as TCC and sandboxing, which apply even if you aren't root. The notion that a non-root app should feel free to muck around with your entire home directory was fine in the 1970s but isn't today.
And you point being? I said that iOS does not have the concept of user accounts and I meant it for users using iOS devices. I think you know what I meant. Nice redirection.iOS has root just like macOS does.
Netfilter, as I explained it, is a sub-system of Linux. It is not an app. Not sure if you understood what I wrote. FYI, iOS is based off Darwin kernel, which is also open-sourced. I'm not sure what you even mention open-sourced VPN apps. Scrathing my head here.It's not relevant. Open-source VPN apps for iOS exist if that's your concern.
What did Apple disagrees with in your opinion? Apple only provides APIs for developers to implement their VPN protocols. That's about it. I don't think Apple has any stance on how you make use of the VPN services.And Apple disagrees and offers broader use cases for VPNs.
I'm not sure why some of you keep arguing this since it's the entire premise of this article. If you think VPNs should only be for giving access to private resources, that's fine. Connect to the VPN, you get access. Disconnect, the routes get removed and existing connections won't work any more. This discussion is not about that.
I don't think you understand what I'm explaining to you in my previous post to yourself. By using a VPN service, all you are doing is transferring the knowledge of your location from your ISP to your VPN service provider. How is that obscuring your original location. If the argument is obscuring from your ISP, it is silly. Your ISP already knows where you are.There is a privacy aspect in that it obscures your original location.
It doesn’t explain that!Ah, well that probably explains why on my last trip to *cough* a country that shall remain unnamed, but where the Fruit company has many things manufactured *cough* my VPN went tits up and I was unable to use my favourite search engine.
FFS Apple!
Hey relax, APple is the company that cares about your "privacy" and "security" more than any other company in the world. We absolutely need to keep side loading out, and the walled garden in, so that we are all safe from those nasty outsiders who would corrupt your phone. If you don't believe me, just listen to all the fans on this forum that will tell you every time Europe proposes a new lawI remember this getting reported on a couple years ago, and never getting an update. I just assumed it had been fixed.
I’m so glad my privacy has been compromised for the last 2.5 years and still is being compromised while Apple knows about it and does nothing about it.
Anybody knows if this bug only affects 3rd party VPN solutions or also the iOS solution which may be configured in the settings app? Did read the blog post, but this wasn‘t answered satisfyingly.
But what about OS controlled VPN's. I don't think we know, but I'd sure like to. Mainly I use IKEv2 straight from the OS for work.At this time it looks like it only affects VPN and not Private Relay.
But what about OS controlled VPN's. I don't think we know, but I'd sure like to. Mainly I use IKEv2 straight from the OS for work.
No, a VPN app versus OS based VPN. You can do both on the iPhone. (or anything else really)Not sure I get you. This is iOS only.
Or are you looking at corporate VPNs?
I get the feeling corporate users of VPN's will be getting their lawyers to look over the T&C's of the VPN's because they would have been paying for a service which is supposed to protect their clients privacy and security but due to an ios bug this is not the case. How many VPN's have told customers about the ios bug that leaks network traffic? Could be many lawsuits against VPN's in the pipeline.
The difference is that my VPN server is in a different country. Again, in the UK the government has passed laws that allow for blanket surveillance, requiring ISP's to save domain names of every site visited, whether you are suspected of a crime or not. So when I use a VPN, I assume all that the government gets is a foreign IP address and a domain name that indicates it is a VPN, but that's it. Also, snooping is not just done by governments. Thus, I want Apple to provide maximum security and privacy. I am not a security expert - just paranoid. I've heard too many stories from friends who have survived authoritarian regimes.You know that the information leaving the VPN provider network will be equivalent to as if it’s leaving the device’s network provider? Using a VPN provider for Internet access only encrypts the data between device and VPN provider’s network. Once the data leaves the VPN provider network, if it’s not secured (e.g. with TLS 1.2) it’ll be in the clear.
How is using a VPN service for Internet access any more secure? It sure is slower tho., and battery life will be worst.
No, a VPN app versus OS based VPN. You can do both on the iPhone. (or anything else really)
My understanding was that OS based was currently corporate only.
I am not aware of any that can be gotten via the App Store.
It's not, anyone can set it up. No profile needed.My understanding was that OS based was currently corporate only.
Any what?I am not aware of any that can be gotten via the App Store.
It's not, anyone can set it up. No profile needed.
Any what?
Color me confused.
My understanding was that OS VPN is part of the OS install and not a 3rd party post OS install.
No, definitely not, anyone can set up an OS VPN (client side) anytime, as long as they know a server to connect to.Color me confused.
My understanding was that OS VPN is part of the OS install and not a 3rd party post OS install.
Heh.. I've been going back and forth about getting the Reddit app, but ultimately didn't. More so I just forgot about it, and use web to do that. Otherwise, most of my browsing is on a desktop computer.I also question how many programs can ignore rules of the device. Reddit app for example has cellular data use turned off. Without fail, I'm out in a parking lot or large park, and suddenly my watch could buzz a notification of a thread I might be interested in, including graphic. How? Check for wifi connections... None established. Everything secured in the area. Nothing I've ever attempted to connect to. Maybe I'll just leave wifi off when leaving the house to confirm behavior, but always disturbing.
No prob. Remote access can work for connecting to your home and some enterprises might use a commercial VPN like ProtonVPN when in foreign countries. The concept is really versatile and can be used for multiple things.@bobcomer @chucker23n1
Okay - sounds more like terminology. My misunderstanding.
My use has been my general use VPN (ex: ProtonVPN) and the other for Remote Access (employer)
I'd also add here that sometimes, corporations DON'T want all the traffic going through the VPN tunnel!What corporate users mainly care about is a different scenario: you connect to the VPN, and gain access to corporate resources; you disconnect, and lose that access. Presumably, this does work correctly.
It's the opposite that supposedly doesn't work reliably: killing existing connections when connecting to a VPN. This isn't as important a scenario for corporate use. (It might still be desired by IT, such as to ensure all traffic can be inspected by them. But that's something Apple might frown upon anyway, and might not be particularly inclined to support.)
I'd also add here that sometimes, corporations DON'T want all the traffic going through the VPN tunnel!
For example, say you have a home user who wishes to print to their own networked printer(s) while connected to the office via VPN. They'll need a "split tunnel" configuration that purposely routes traffic destined for their local network's IP address range outside the VPN tunnel.