• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

This iOS bug might be stopping your VPN from keeping your browsing secure

March 27, 2020
Share on FacebookShare on Twitter

An unpatched bug in iOS version 13.3.1 or later is preventing VPNs from working properly, potentially opening up users to data breaches.

The vulnerability, disclosed by ProtonVPN, does not terminate a connection when the user connects to a VPN, meaning that if kept active, unencrypted data could be transferred and possibly intercepted.

Unencrypted data can easily reveal personal details like IP address, location, or even expose users and the servers to cyber-attacks.

iOS vulnerability

“Most connections are short-lived and will eventually be re-established through the VPN tunnel on their own,” ProtonVPN explained. “However, some are long-lasting and can remain open for minutes to hours outside the VPN tunnel.” 

Connections made after the VPN tunnel is activated remain secured and while most other OS terminate the existing connections, iOS for some reason keeps the old versions alive. 

Researchers at ProtonVPN cited an example of Apple’s push notifications which uses a process to communicate with Apple’s servers for a long time. This connection does not get terminated automatically and may affect any service or app on the user’s iOS device.

While this bug might not impact an average user, “people in countries where surveillance and civil rights abuses are common,” are at high risk, ProtonVPN noted.

Due to security limitations, any third-party app or VPN cannot terminate these open connections on iOS. The report also suggests that Apple has acknowledged the VPN bypass vulnerability, and until it releases a solution, it recommends customers use an always-on VPN.

People who use other VPN apps can manually kill all the active connections by enabling and disabling Airplane mode after connecting to a VPN. While this workaround may kill most of the active connections, it may not be a 100% effective solution.

  • Let us help you pick the best VPN options

Via: BleepingComputer

Next Post

NASA still tracking towards mid-to-late May SpaceX crew launch despite parachute mishap – TechCrunch

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Supply-chain attack using invisible code hits GitHub and other repositories
  • NYT Mini crossword answers, hints for March 13, 2026
  • You can now buy the Nothing Headphone (a) and its massive five-day battery
  • Ryan Gosling responding to unpopular opinions from radio callers is hilarious
  • Steven Spielberg praises ballet and opera at SXSW amid Timothée Chalamet backlash

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously