So you are okay with developers stealing ?Is this seriously what you took from the article?
A [working] VPN connection and privacy should be a universally accepted basic human rightThough even using a VPN could be illegal, let alone anything that might be done over that VPN.
No - not saying it is right. Just pointing out that some things you and I may do legally are not necessarily legal elsewhere.
Minimally, all app developers must adhere to APIs provided by Apple. Since this is reproduced from multiple VPNs installed on multiple versions of IOS, one could assume that not all of them are goofing up the implementation of the API. It is conceivably possible that Apple has a problem here, and not just a single vendor.Interesting article: https://arstechnica.com/information...ic-more-than-2-years-later-researcher-claims/
So the "leaked" traffic is existing connections that the VPN app doesn't terminate? The ArsTechnica article makes it seem like it is the app's fault for not re-routing/terminating them?
That might well be your opinion. It might be mine. But it is not the opinion of at least ten countries:A [working] VPN connection and privacy should be a universally accepted basic human right
Agreed, it is definitely possible. The ArsTechnica article seems to focus on one VPN company specifically tho.Minimally, all app developers must adhere to APIs provided by Apple. Since this is reproduced from multiple VPNs installed on multiple versions of IOS, one could assume that not all of them are goofing up the implementation of the API. It is conceivably possible that Apple has a problem here, and not just a single vendor.
And for all that Apple does to claim they care about security and privacy, to ignore this report for 2 years deserves some grief. I mean, I half expect Apple to come back and say "You're VPN-ing it wrong." or "you need to be using this undocumented, unreleased API feature, and yes, it's the all of the app developer's fault".
I highly doubt that, as the article and researcher state this has been an issue for over two years. Isn’t private relay a new addition to iOS 15?Any chance what this researcher is seeing is stuff bypassing the vpn to go to iCloud private relay? I agree that the vpn shouldn’t be bypassed, but without mentioning whether this feature was on or off I’m not sure this is a conclusive test.
I highly doubt that, as the article and researcher state this has been an issue for over two years. Isn’t private relay a new addition to iOS 15?
From the arstechnica article:The ArsTechnica article seems to focus on one VPN company specifically tho.
These negative articles by security people are ridiculous. Their attitude is "anything less than 100% security is unacceptable."
That isn't really true, unless you're one of the few thousand people that are being targeted by the government. And even then, it's unlikely that this issue will affect you. Do you have an ANSI-1 locks on your doors? If not, then you shouldn't care.
Although network transitions should cause everyone to re-establish their persistent connections, this also could allow a malicious actor to easily MTM all network traffic of the device...which is the downside to the "feature."
Simple workaround: quit all your messaging apps after connecting to a VPN...or restart your phone then start your VPN.
Shady VPN companies spend millions advertising how secure they are, knowing all along about this vulnerability and others not public. Everyone who was notified by their VPN companies about this issue and your risk raise your hand.At my level of government I can even see what your doing on a VPN so I wouldn’t worry. VPN’s aren’t as secure as the common folks think…
Ah I’m just screwing with you, you can take your tin foil hat off![]()
The VPN company is secure in and of itself.Shady VPN companies spend millions advertising how secure they are, knowing all along about this vulnerability and others not public.
Shady VPN companies spend millions advertising how secure they are, knowing all along about this vulnerability and others not public.
These negative articles by security people are ridiculous. Their attitude is "anything less than 100% security is unacceptable."
Simple workaround: quit all your messaging apps after connecting to a VPN...or restart your phone then start your VPN.
Proton found it already in iOS 13. AFAIR, there was no iCloud private relay at that time.Any chance what this researcher is seeing is stuff bypassing the vpn to go to iCloud private relay? I agree that the vpn shouldn’t be bypassed, but without mentioning whether this feature was on or off I’m not sure this is a conclusive test.
I don't read it like that, but it really doesn't matter that much. We just don't have enough info to place the blame squarely on the VPN's fault, or the OS. However, I expect the VPN guys to know about existing connections and what should be done about them. (it should actually be an option to either kill all connections, or let them be, as there really is a use case for keeping existing connections.)Well, since the ArsTechnica article makes it seem like it's the VPN app's fault for causing this...