• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

This iOS bug might be stopping your VPN from keeping your browsing secure

March 27, 2020
Share on FacebookShare on Twitter

An unpatched bug in iOS version 13.3.1 or later is preventing VPNs from working properly, potentially opening up users to data breaches.

The vulnerability, disclosed by ProtonVPN, does not terminate a connection when the user connects to a VPN, meaning that if kept active, unencrypted data could be transferred and possibly intercepted.

Unencrypted data can easily reveal personal details like IP address, location, or even expose users and the servers to cyber-attacks.

iOS vulnerability

“Most connections are short-lived and will eventually be re-established through the VPN tunnel on their own,” ProtonVPN explained. “However, some are long-lasting and can remain open for minutes to hours outside the VPN tunnel.” 

Connections made after the VPN tunnel is activated remain secured and while most other OS terminate the existing connections, iOS for some reason keeps the old versions alive. 

Researchers at ProtonVPN cited an example of Apple’s push notifications which uses a process to communicate with Apple’s servers for a long time. This connection does not get terminated automatically and may affect any service or app on the user’s iOS device.

While this bug might not impact an average user, “people in countries where surveillance and civil rights abuses are common,” are at high risk, ProtonVPN noted.

Due to security limitations, any third-party app or VPN cannot terminate these open connections on iOS. The report also suggests that Apple has acknowledged the VPN bypass vulnerability, and until it releases a solution, it recommends customers use an always-on VPN.

People who use other VPN apps can manually kill all the active connections by enabling and disabling Airplane mode after connecting to a VPN. While this workaround may kill most of the active connections, it may not be a 100% effective solution.

  • Let us help you pick the best VPN options

Via: BleepingComputer

Next Post

NASA still tracking towards mid-to-late May SpaceX crew launch despite parachute mishap – TechCrunch

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Steven Spielberg says Barack Obama’s alien comments are ‘so great for ‘Disclosure Day”
  • Donkey Kong Bananza Began As A Goomba With Giant Fists
  • Shark Rocket Ultra-Light Vacuum deal: $99 at Amazon
  • Instagram to discontinue end-to-end encryption for DMs [Update: Meta’s statement]
  • Best TV deals this week: Save big on TCL T7, Hisense U8, and Samsung Q8F models

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously