

It's what Macrumors is all about these days. The title of the ArsTechnica article is: "iOS VPNS have leaked traffic for more than 2 years, researchers claim."īy all means, continue the frothing at the mouth Apple so horrible posts. "Your other connections should also reconnect inside the VPN tunnel, though we cannot guarantee this 100%," ProtonVPN wrote." "ProtonVPN had suggested a workaround that was "almost as effective" as manually closing all connections when starting a VPN: Connect to a VPN server, turn on airplane mode, then turn it off. The Kill Switch function added to ProtonVPN, which describes its function as blocking all network traffic if the VPN tunnel is lost, did not prevent leaks, according to Horowitz." "Horowitz tested ProtonVPN's app in mid-2022 on an iPad iOS 15.4.1 and found that it still allowed persistent, non-tunneled connections to Apple's push service. Most existing connections will eventually end up inside the tunnel, but some, like Apple's push notification service, can last for hours." "Like Horowitz's post, ProtonVPN's blog noted that a VPN typically closes all existing connections and reopens them inside a VPN tunnel, but that didn't happen on iOS. So the "leaked" traffic is existing connections that the VPN app doesn't terminate? The ArsTechnica article makes it seem like it is the app's fault for not re-routing/terminating them?
