Skip to main content

It's possible Apple's Private Relay VPN isn't so private after all

A potential security flaw in iCloud Private Relay can lead Apple’s VPN to ignore firewall rules and send some data back to the iPhone maker’s servers.

This leak itself was first discovered by the VPN company Mullvad which was monitoring network connections while working on its own app.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

For those unfamiliar, Private Relay functions in a similar way to a VPN tunnel or how Tor works by routing a user’s encrypted network through relay servers before it reaches the internet. The service is currently still in beta and is only available in certain regions though it also requires a paid iCloud+ subscription.

TechRadar Pro reached out to Apple regarding this potential leak in iCloud Private Relay but we’ve yet to hear back at the time of writing. However, since the service is still in beta, this issue could be rectified before it becomes generally available. Since iCloud Private Relay’s beta release coincided with the launch of iOS 15, Apple could make the service available in full with the release of iOS 16 in September of this year.

Ignoring firewall rules

According to a new blog post from Mullvad, the VPN company was monitoring network connections when it noticed that QUIC traffic was leaving one of its computers outside of a VPN tunnel.

Disabling Apple’s Private Relay feature made the leaks stop and the company has even provided instructions so that other users can reproduce the leak on their own. Mullvad also  pointed out in its blog post that Private Relay (mostly) disables itself as soon as any firewall rule is added to the Packet Filter (PF) system firewall on macOS devices. 

As such, the company believes that the leak itself is just some kind of heartbeat signal calling home to Apple. Although it’s impossible to know what information is transmitted to Apple’s servers, the leak does send a clear message to both your local network and ISP that you might be a macOS user.

At this time, Mullvad is unaware of any way to prevent Private Relay from leaking user traffic back to Apple but the company recommends that users disable the feature altogether for the time being if their threat model forbids their local network or ISP from knowing what kinds of devices they’re currently using.

Via AppleInsider



Source: TechRadar

Popular posts from this blog

Twitter has hidden the chronological feed on iOS again – and I'm furious

In a controversial move, Twitter has brought back a feature that removes the 'Latest Tweets' view for users on iOS, which is something that many users, including me, hated back in March 2022 – and it's now rolling out. The first time the company decided to do this, 'Home' would appear first in a tab at the top, and there was no way of changing it so that 'Latest Tweets' would be the default view. It was reverted back after the company said it was a 'bug' for iOS users. This time though, it's no bug. Instead, it's 'For You' and 'Following' where you can only swipe between them now, which doesn't make much sense for a platform where you're using the platform to keep up to date with who you follow. It's a bizarre change that makes me ask – who wants this, especially during a time when its new owner, Elon Musk, is bringing in and reversing changes almost every week still? This one change will have big consequenc

New MacBook Pro Reviews: Hands-On Look at Performance and Upgraded Specs

The new 14-inch and 16-inch MacBook Pro models will start arriving to customers and launch in stores this Tuesday. Ahead of time, the first reviews of the laptops have been shared by select media publications and YouTube channels. Powered by Apple's latest M2 Pro and M2 Max chips, the new MacBook Pros offer up to 20% faster performance and up to 30% faster graphics. The laptops can be configured with up to 96GB of RAM, compared to a max of 64GB previously. Other improvements include Wi-Fi 6E, an upgraded HDMI 2.1 port with support for up to an 8K external display, and an extra hour of battery life over the previous generation. The new MacBook Pros have the same design as the previous models released in October 2021. The laptops can be pre-ordered on Apple's online store, with pricing starting at $1,999 for the 14-inch model and at $2,499 for the 16-inch model. Benchmarks Geekbench results from last week revealed that the M2 Pro and M2 Max chips offer up to around 20%

iPhone 15 Pro Rumored to Feature Ultra-Thin Curved Bezels

The iPhone 15 Pro models will have thinner, curved bezels compared to the iPhone 14 Pro models, potentially resulting in an Apple Watch-like appearance, according to the leaker known as " ShrimpApplePro ." ShrimpApplePro clarified that the next-generation "Pro" iPhone models will still have flat displays, since only the bezels are to be curved. According to a source speaking to the leaker, this combination of slimmer bezels and curved edges could result in a look similar to the Apple Watch Series 7 and Series 8. The curved front glass will purportedly also be present on the ‌iPhone 15‌ and ‌iPhone 15‌ Plus's design, but these devices will not have thinner bezels compared to their iPhone 14 predecessors. ShrimpApplePro added that the ‌iPhone 15‌ lineup will feature the same display sizes as last year's ‌iPhone 14‌ lineup. Last year, the leaker was among the first to say that the ‌iPhone 15‌ Pro models will have a titanium frame with curved rear ed

This new Linux malware floods machines with cryptominers and DDoS bots

Cybersecurity researchers have spotted a new Linux malware downloader that targets poorly defended Linux servers with cryptocurrency miners and DDoS IRC bots. Researchers from ASEC discovered the attack after the Shell Script Compiler (SHC) used to create the downloader was uploaded to VirusTotal. Apparently, Korean users were the ones uploading the SHC, and it’s Korean users who are targets, as well. Further analysis has shown that the threat actors are going after poorly defended Linux servers, brute-forcing their way into administrator accounts over SSH.  Mining Monero Once they make their way in, they’ll either install a cryptocurrency miner, or a DDoS IRC bot. The miner being deployed is XMRig, arguably the most popular cryptocurrency miner among hackers. It uses the computing power of a victim's endpoints to generate Monero, a privacy-oriented cryptocurrency whose transactions are seemingly impossible to track, and whose users are allegedly impossible to identify. Fo