Never had an issue with this. iOS is rock solid and super-secure. Don't buy the FUD.
How do you know you've never had this happen? Don't buy the fanboi nonsense.Never had an issue with this. iOS is rock solid and super-secure. Don't buy the FUD.
While this is bug that should get fixed you have to recall that for the initial intent of VPN this is not really an issue. A VPN was designed and intended to make your machine look like it's on another network in another location. Ex: you're at home or on a sales call in the field and need to use the server or printer in the office.
"privacy" companies have cop-opted the VPN structure to route all your internet traffic through them as the "remote location", and may provide add-on features to make you feel more secure.
For the overwhelming majority of people, even if your traffic (likely https, or other SSL encrypted data) bypasses the VPN the only thing anyone between you an the server can see is that you are connecting to the server, the data itself is most likely still secure and private.
When you're "out and about" or in less than "pro privacy" locations a VPN will keep those snoopers from seeing what you're actually doing; but then again simply using a VPN may raise suspicions and investigation by the authorities
VPNs aren't the magic panacea of privacy that those who sell them to you want you to believe they are unless you 100% trust the admins there to not be snooping on you for thier own gains.
I believe you're right here. We have people on both sides of the coin wanting to place what they believe to be obvious blame. ArsTechnica could have gone more with a "this is Apple's fault" but I don't think that's completely proven. Is it possible? Oh definitely.I don't read it like that, but it really doesn't matter that much. We just don't have enough info to place the blame squarely on the VPN's fault, or the OS. However, I expect the VPN guys to know about existing connections and what should be done about them. (it should actually be an option to either kill all connections, or let them be, as there really is a use case for keeping existing connections.)
What I would need to know, is if the OS's ip stack would allow a third party app to send a kill connection signal on other app connections, and this is where I suspect the problem is -- the VPN isn't being allowed to kill the connections. It sounds so like apple and their allowing their own app connections to bypass a VPN. I knew about the existing connections problem, but I actually have a bigger beef with what the IP stack doesn't pass thru, but that's a whole different discussion.
Nice to know Apple was faffing about with CSAM stuff while this vulnerability just sat there. Perhaps Apple should refund those of us who pay for VPN services? I live in the UK, where pretty much everybody, at every level of government, can gain access to your browsing history unless you use a VPN.
Do you use VPNs?Never had an issue with this. iOS is rock solid and super-secure. Don't buy the FUD.
I would imagine that if I were a VPN vendor and had a limited API to develop for an OS, that I would trust the OS to deliver the promise of routing accordingly. This isn't passing the buck -- it's not inherently any software developer's responsibility to test for flaws in the API stack.Better question — how many VPN vendors know about this and continued to sell you their products? Surely they tested their own products thoroughly and came to the same conclusion?
I'll give you that. If I was an iOS developer - I would hope that the OS would have a call to terminate all connections and thus re-route or route all new connections from that point forward to the VPN instance my app created.I would imagine that if I were a VPN vendor and had a limited API to develop for an OS, that I would trust the OS to deliver the promise of routing accordingly. This isn't passing the buck -- it's not inherently any software developer's responsibility to test for flaws in the API stack.
Additionally this might have worked initially and degraded over time.
Not an excuse for either side of this argument, just a statement. ISVs do not inherently have any rights over the OS and must utilize the APIs provided.
Do you use VPNs?
Have you tested for data leakage while using VPNs?
Have you reproduced the article's attestations?
leave it to apple to screw up something as basic as vpn
It was an eye opener to me to use https://objective-see.org 's tools to see exactly what was going on in the background. So many apps (even name brand) making so many calls to seemingly random IPs constantly throughout the day... Just astounding. One app would send a call to several IPs every time I moved a mouse over it. lol.Yes.
Yes.
No.
Show your results here and to the original author. What VPN software did you use, what router did you use for logging, how long did you test for, etc.Yes.
Yes.
No.
Show your results here and to the original author. What VPN software did you use, what router did you use for logging, how long did you test for, etc.
VPN companies are tiny compared to Apple. So, suing the all evil Apple seems to be the right choice here.So, who I should/could sue? Apple? VPN services? Not kidding.
You pay a VPN company not Apple for the service. Apple is at fault for not fixing this problem. VPN companies are at fault for not disclosing that their products are compromised and putting customers at risk.You are wrong here. Apple has a policy to not allow fraudulent apps on its store right? It claims to vet every single app on the store for its legitimacy yes? This issue is affecting ALL VPN’s from small ones to well established brands.
It allows VPN’s because Apple full well knows it is its fault or by its design that they do not work correctly. And I don’t know but I’ll take a guess here that their are clauses in the contracts VPN ‘s have with Apple to sell their services which prevent them from publicly calling out Apple.
So please do not just accuse other companies for something Apple is fully aware of and allows to happen daily, for over 2 years now. VPN’s are working fine on other platforms. Apple are the ones at fault, not the VPN companies.
Your dignity!!! YOUR DIGNITY!!!!! ... <cries> Your.... dig...nity... /s.The main thing is I continue to trust iOS as the world's most advanced and secure operating system.
You pay a VPN company not Apple for the service. Apple is at fault for not fixing this problem. VPN companies are at fault for not disclosing that their products are compromised and putting customers at risk.
Yes, it really is. View his oeuvre.Is this seriously what you took from the article?
Or privacy ;-)The average user wouldn't even have a clue about what a VPN is.
It is really you Hairfarce One?The main thing is I continue to trust iOS as the world's most advanced and secure operating system.