Tuesday, November 29, 2022

VPN traffic leak on iOS can't be fixed for 2 years

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

VPN traffic leak on iOS can't be fixed for 2 years

Back in early 2020, the secure mail provider ProtonMail reported a vulnerability in iOS version 13.3.1 from Apple that did not allow VPN to encrypt all traffic.

The problem was that the operating system failed to close existing connections. Which could potentially allow an attacker to identify the VPN user's original IP address.

ProtonMail said at the time that Apple was aware of the problem and was considering solutions.

The vulnerability has not been fixed in versions 13.4, 13.5, 13.6, 13.7, 14 and higher.

Security researchers conducted a new audit — iOS 15.6.1, this version is still vulnerable.
iOS 16 as of October 13, 2022, also remains vulnerable.

"VPN doesn't work on iOS. VPN on iOS is a scam.

At first it seems that they are working fine. The iOS device gets a new public IP address and new DNS servers. The data is sent to the VPN server.

But over time, a detailed check of the data leaving the iOS device shows that there is a leak through the VPN tunnel. The data leaves the iOS device outside of the VPN tunnel. This is not a classic/outdated DNS leak, this is a data leak," experts say, citing router logs as evidence.

Apple declined to comment.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=V35J
-----END PGP SIGNATURE-----

https://multivpn.su

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.