• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

Latest iOS Found to Bypass VPN Connection for Some Services

July 25, 2023 By Heinrich Long — 4 Comments
Latest iOS Found to Bypass VPN Connection for Some Services

The duo of security researchers called ‘Mysk’ report that their tests show that the latest stable version of iOS, 16.6, and the one before it, 16.5.1, still bypass VPNs.

The services found to bypass VPN connections include Apple Maps and Apple Push Notification, while even the security-bolstered “Lockdown Mode” isn’t excluded from the dangerous behavior.

This means that Apple iPhone devices send and receive some network traffic in unencrypted form regardless of whether the user has enabled a VPN connection, leaving them exposed to limited profiling, traffic interception, snooping, browsing history logging, and blocking.

iOS 16.5.1 still bypasses the VPN. New tests show that Apple Push Notification traffic completely ignores the VPN connection. Apple Maps sends many requests outside the VPN, including unencrypted DNS requests. This also happens in the Lockdown Mode. 🎬https://t.co/302I4nf8j9 pic.twitter.com/Q3GW14RYOO

— Mysk 🇨🇦🇩🇪 (@mysk_co) July 23, 2023

The same peculiar behavior was confirmed on iPadOS 17 beta 3, a special iOS version for Apple tablets, expected to be fully released in September 2023. The presence of the problem in multiple iOS versions, even the third beta of the upcoming major release, is disheartening when considering Apple’s priority in fixing the issue.

Mysk first discovered and reported the issue of Apple services communicating outside active VPN tunnels, and leaking DNS requests, in October 2022. The services found to ignore VPN tunnels back then were Apple Health, Maps, and Wallet, which carry sensitive user data. Possibly, Apple has set iOS devices to bypass VPN connections for some data exchanges for years, although it’s unclear when this practice started.

Previously, the tech giant suggested that VPN app developers should ensure that their clients use and set the “includeAllNetworks API,” however, Mysk’s tests showed that even with Proton VPN that sets this flag, the bypassing still occurs. In fact, the same behavior is observed across all VPN products the researchers tested on the iOS.

Apple seems to have made the decision to continue routing some traffic outside active VPN configurations, overriding user settings potentially due to security, functionality, or other reasons. However, this decision does not appear to have been adequately communicated to VPN vendors and users, causing confusion within the community regarding the scope and effectiveness of their iOS VPN tools.

RestorePrivacy has contacted Apple for a comment on the above, asking if they plan to change the VPN exclusion behavior in a future version of the iOS, but we have not received a response by publication time.

Related Articles:

  • Apple iOS and macOS Impacted by New Bugs Bypassing Code Signing
  • Any of 1M Sites Could Have Exposed Cleartext User Passwords
  • Android App with 100M Downloads Found Sending Data to Remote Servers
  • WhatsApp Adds Proxy Support to Help Users Bypass Blocks

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Comments

  1. BB

    July 31, 2023

    Despite using a VPN, many applications on Android, including WeChat and WhatsApp, will still access your actual location even if you use a GPS location spoofer. However, it appears that no one is criticizing Android for this issue.

    Reply
    • Leander

      August 8, 2023

      What does have you do with Apple?

      Reply
  2. mullvadletmeuseyourDNS

    July 26, 2023

    Mullvad has known about this for years:
    https://mullvad.net/en/blog/2020/5/4/ios-vulnerability-puts-vpn-traffic-risk/

    How to mitigate the iOS vulnerability

    Internet connections that are established after connecting to a VPN are unaffected, but connections that are already running are at risk.

    To ensure that all of your traffic is secure, do the following:

    Connect to Mullvad VPN.
    Enable Airplane Mode.
    Turn off Wi-Fi if it’s on.
    Disable Airplane Mode.

    Reply
    • Sven Taylor

      July 26, 2023

      As noted and linked in the article, Proton also pointed this issue out years ago in March 2020, I believe before Mullvad.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Restore Privacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN [68% Off Coupon] or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP