[HN Gopher] Apple's iCloud+ "VPN"
       ___________________________________________________________________
        
       Apple's iCloud+ "VPN"
        
       Author : n1000
       Score  : 771 points
       Date   : 2021-06-16 12:05 UTC (10 hours ago)
        
 (HTM) web link (www.metzdowd.com)
 (TXT) w3m dump (www.metzdowd.com)
        
       | bitcurious wrote:
       | Correct me if I'm wrong, but as I understand it a two-hop onion
       | network is still trivially breakable with (two) warrants,
       | especially since both Apple and Cloudflare/etc., are US
       | companies. Which would make it a VPN in the duck-type sense.
        
         | gjsman-1000 wrote:
         | It depends, whether they do no logs. There are many VPN
         | providers in the US which don't have logs, so that if they are
         | subpoenaed, they have nothing to give.
         | 
         | The beauty of Apple's double hop is that if one partner was
         | hacked, secretly wiretapped, or had lied about not keeping
         | logs, your connection would still be private.
         | 
         | But, that assumes that nobody on this network is keeping logs.
         | If they are, then it could be theoretically possible to piece
         | them together. However considering Apple's marketing with
         | privacy, it would be interesting to see whether they keep logs
         | on each endpoint or not.
        
           | heavyset_go wrote:
           | > _It depends, whether they do no logs_
           | 
           | Courts can compel them to keep logs.
        
           | nojito wrote:
           | What would the logs contain?
           | 
           | I believe everything is encrypted on device before being sent
           | to Apple.
        
             | TedDoesntTalk wrote:
             | Timestamp, source and destination ip addresses, username.
             | In the case of the exit node, url.
        
               | nojito wrote:
               | Only the timestamp and username would be available from
               | Apple.
        
               | krferriter wrote:
               | Source IP address and next-hop IP address would be as
               | well.
        
               | nojito wrote:
               | Source on the next hop address?
               | 
               | Apple doesn't know where you're going.
        
               | NorwegianDude wrote:
               | They shouldn't know about the end destination, but
               | they'll know your traffic was sent to eg. Cloudflare or
               | whatever.
        
               | nojito wrote:
               | I would think they batch together all the IPs and pass it
               | off.
               | 
               | It's in Apple's best interest to keep the bare minimum
               | information they need from their end-user.
        
               | gjsman-1000 wrote:
               | We don't know that Apple keeps logs. These are things
               | they could theoretically keep, but we don't know if they
               | store them or not.
        
               | LegitShady wrote:
               | If they don't clearly state 'no logs' then its unlikely
               | they are not logging. My bet is they're logging
               | everything, because they have no advantage in not
               | logging.
        
           | wolverine876 wrote:
           | > There are many VPN providers in the US which don't have
           | logs
           | 
           | Many claim they don't have logs, and my understanding is that
           | it has been sometimes revealed that they do have logs. Also,
           | how do you run a server without logs? Many think those claims
           | are BS.
        
         | path2power wrote:
         | If your threat model includes state level actors, there is no
         | commercially available solution that will make you 100% safe.
         | This is about privacy from private corporations and making it
         | more difficult and more costly for governments to get your
         | data. But the latter is always possible when you use the web.
        
           | bitcurious wrote:
           | >If your threat model includes state level actors
           | 
           | My personal threat model doesn't include state level actors,
           | but if it did I would certainly differentiate between a
           | solution that the NSA can break with some expense and one
           | that my local police department can break with a warrant.
           | 
           | My actual threat model is advertisers, so I think the Apple
           | solution is quite elegant and will serve me well. It
           | shouldn't be conflated with TOR though.
        
         | atonse wrote:
         | That's the beauty of this. Party 2 only knows Apple's IP. Apple
         | doesn't know what site you're visiting.
         | 
         | So how do you assemble "all traffic to this site" even by
         | subpoenaing both parties?
        
           | lxgr wrote:
           | To party 1: "Give us a netflow log of all of this user's
           | traffic." To party 2: "Give us a list of all outbound
           | connections matching this netflow list of inbound proxying
           | requests."
           | 
           | It would work the other way around as well (going from
           | visited sites to a given Apple id). If you can monitor all
           | nodes in an onion routing network, you can deanonymize
           | everybody.
        
             | gjsman-1000 wrote:
             | Well, here's the catch. Even if logs were kept, the 2nd
             | party as far as we know does not have a unique identifier
             | passed onto it.
             | 
             | This means that Apple's logs would say this user
             | authenticated and passed some encrypted stuff to Fastly,
             | and Fastly would say that it received requests from Apple,
             | without an identifier to match it up against the first
             | request.
             | 
             | Once this scales and Apple has millions of requests
             | incoming, there will be no way to conclusively prove that
             | two requests are the same.
             | 
             | In which case a double subpoena is again useless. And this
             | assuming they keep logs - if they don't keep logs, which is
             | more likely, it's even more useless.
             | 
             | This also aligns with something we currently know. Apple
             | says they can't see your requests. This implies that they
             | just pass data along in an encrypted format to their
             | partners. So all Apple does is make it so their partners
             | don't know your device, and the partners ensure Apple
             | doesn't know your request.
             | 
             | Ultimately, even if logs were kept, there would have to be
             | a unique identifier of some sort that was passed on to the
             | second server from the first server to break the system.
             | You decide the odds that they did that. Sounds a lot like
             | an IP Address, in which case why not just build a classic
             | VPN?
        
               | opheliate wrote:
               | Surely some "unique" identifier is required for each TCP
               | session between Apple and the exit node so that Apple
               | knows where to send the data it gets back, even if it's
               | just the port on which Apple connect to the exit node as
               | with standard TCP session management.
        
               | ska wrote:
               | How would that help you identify all of a particular
               | users interactions (rather than one)? Why would you
               | expect them to log it?
        
               | opheliate wrote:
               | If Apple logged (incoming IP from user, outgoing port to
               | exit node) pairs for each session, and the exit node
               | logged all requests, this should be sufficient to
               | associate all requests with a given user IP, right? Or am
               | I misunderstanding you?
               | 
               | I wouldn't expect them to log it, personally, I think
               | that can only lead to headaches down the line. My reason
               | for responding is just that I disagree that there is no
               | way for another party to associate all requests even if
               | Apple & exit node both fully cooperate and keep logs.
        
               | ska wrote:
               | We are thinking about this the same way. Individual
               | sessions don't do you much good, but there is
               | traceability iff both parties keep complete logs. Which
               | seems unlikely unless coerced.
        
         | [deleted]
        
       | gjsman-1000 wrote:
       | So far, partners of Apple I've seen the service forwarding to are
       | CloudFlare, Akamai, and Fastly. There may be more but those are
       | the ones I've seen and heard.
        
         | ehsankia wrote:
         | Wait a second, didn't the Fastly breakage happen the day after
         | WWDC? What are the chances that the one client was Apple and
         | their config was for this service :)
        
       | freakynit wrote:
       | Apple in a few months to VPN's: give us 30% share if you want to
       | serve as exit node to Apple iCloud+ VPN.
       | 
       | Two part strategy as always:
       | 
       | 1. Get yourself in-between of an already functioning system, by
       | force if needed 2. Abuse your market position to gain millions of
       | users, make it super easy to use this as default, and make
       | existing players compete for their 70% share of what they already
       | were earning.
       | 
       | - Enjoy new billions on top of existing trillions
        
         | permo-w wrote:
         | This goes against my general distrust of giant corporations,
         | but I trust Apple a lot more than I do the extremely shady VPN
         | companies infesting the internet
        
       | njacobs5074 wrote:
       | Does anyone have pointers to info/articles about the countries
       | that are on the "no VPN" capability list?
       | 
       | Some of them make sense to me, i.e. China which has a long
       | history of censoring their citizens.
       | 
       | But in particular, I'm trying to find out why South Africa is on
       | that list seeing as I live there.
       | 
       | Edit: In [1], Apple is quoted as saying, "We respect national
       | laws wherever we operate" but did not elaborate further.
       | 
       | [1] https://mybroadband.co.za/news/internet/400893-apple-will-
       | no...
        
         | gjsman-1000 wrote:
         | Another reason could also be that the servers operate in the
         | same nation that you are from. If Apple or no suitable partner
         | has servers in South Africa, that could also be a reason.
         | 
         | And, of course it could be politics. The South African
         | government, I wouldn't know, but it could be possible that they
         | wouldn't let tech companies from the US build servers in their
         | nation.
        
         | jammmety wrote:
         | Apple said it also will not offer "private relay" in Belarus,
         | Colombia, Egypt, Kazakhstan, Saudi Arabia, South Africa,
         | Turkmenistan, Uganda and the Philippines.
         | 
         | https://www.reuters.com/world/china/apples-new-private-relay...
        
       | thih9 wrote:
       | What's are the differences between a VPN and an onion router
       | approach? Could anyone explain or link to an article?
        
         | thehappypm wrote:
         | A VPN is a middleman that accepts your traffic and forwards it,
         | hiding who you are to servers. An onion router is like a VPN
         | but instead of 1 middleman, the middleman is a whole random
         | network of middlemen, and those middlemen also hand off to
         | other middlemen.
        
           | mikemyoung1 wrote:
           | This is a great summary, thanks
        
           | permo-w wrote:
           | What I don't get is why people don't regard Onion Routers as
           | a form of VPN. It's still uses a virtual private network,
           | just more of them. a network of networks.
           | 
           | Surely TOR is a type of VPN?
           | 
           | Maybe there's some details I'm missing. I'm no expert
        
             | detaro wrote:
             | Really mostly convention. Yes you could label it that way,
             | but people consider it to be enough of it's own thing to
             | not do so. (+ there is some value in not conflating the two
             | because they do have different threat models etc and users
             | should treat them differently too)
        
       | headmelted wrote:
       | I've been trying to point this out to people but YouTube
       | personalities have a louder voice than anyone else so you end up
       | with bad information.
       | 
       | Props to Apple for offering an (albeit low entropy) onion router
       | on their own infrastructure. I can't imagine this is going to win
       | them any friends in government circles but it's definitely a step
       | in the right direction.
       | 
       | I'd also really like to see Apple come clean about the iCloud
       | backup encryption debacle. A lot of people are trusting it to be
       | something it's not and it should really be clarified on-device
       | what it is and is not before opting in.
        
         | yepthatsreality wrote:
         | Apple won't come clean until they can sweep it under the rug
         | like they did with the other debacles (see: keyboards). Being
         | honest about those things undermines their "Apple knows best"
         | image attempt.
        
         | ______- wrote:
         | > I'd also really like to see Apple come clean about the iCloud
         | backup encryption debacle
         | 
         | Are you referring to this article?:
         | 
         | https://www.reuters.com/article/us-apple-fbi-icloud-exclusiv...
         | 
         | It's why I only use my Apple ID for grabbing apps from the app
         | store. I have disabled all the `cloud storage` features of
         | iCloud. iCloud is a privacy nightmare.
        
           | gjsman-1000 wrote:
           | By that logic though, Google Drive, OneDrive, AmazonS3, they
           | are all privacy nightmares. And you might agree, but Apple is
           | hardly alone.
           | 
           | And like the article says, they didn't want to poke the bear
           | anymore. Of course the FBI has congressional friends. It is
           | possible that Apple saw the risk of it backfiring and making
           | things worse as too great.
        
             | modeless wrote:
             | Google does end-to-end encryption of Android backups. And
             | Apple knows how to do it too, but they intentionally
             | restricted their implementation to only cover backups of
             | Keychain passwords and a few other things, apparently
             | because they don't have the courage to stand up to the FBI,
             | according to Reuters. Strange considering their public
             | stance against the FBI in the San Bernardino case and on
             | privacy issues in general. Especially since iCloud backup
             | totally defeats the highly touted end-to-end encryption in
             | iMessage.
        
               | gjsman-1000 wrote:
               | Yes, backups, and Apple should get on that. However, your
               | photos in Google Photos, your location data, your uploads
               | in Google Drive (equivalent to iCloud Drive OP is talking
               | about), not end to end encrypted and no option for it.
               | 
               | I think market share is another sign. Does anyone use
               | actual Android Backup, or do they use the unencrypted
               | "backups" in G Photos and elsewhere? For that reason
               | should the FBI care? Maybe I'm wrong but I believe actual
               | Android Backup is much less used than iCloud and
               | confusingly named alternative "backups" within Google
               | apps.
        
               | headmelted wrote:
               | Let's be really frank about it - no large company is
               | going to offer end-to-end encryption of photos because of
               | what kind of photos might end up on their infrastructure
               | if they do. And honestly I don't blame them _at all_.
               | 
               | I'd just like to see Apple be more transparent with this
               | one particular issue because it undermines so much of
               | what they're advertising to the consumer.
               | 
               | A transparency label for iCloud backup showing what is
               | and is not E2E before enabling would do. Most people
               | (myself included) would be quite happy with photos being
               | encrypted by an Apple-held key (I'm not worried about the
               | police seeing my boring lunch pics, I just don't want
               | photos of my kids being readily accessible to everyone
               | else).
               | 
               | It should be made clear if they're offering E2E for some
               | features that other settings will render it pointless is
               | all I'm saying.
        
               | smoldesu wrote:
               | Any large company can offer E2E encryption, as long as
               | they don't have extenuating interests that could make
               | them liable for the way I use their services. Unless
               | Apple is harvesting my data on the regular, they should
               | have no problem with me being the sole keyholder for my
               | iCloud account.
        
               | tgragnato wrote:
               | I think Apple would need to ship a different OS in China.
               | 
               | Cloud services offered there must store data in the
               | country and be operated by Chinese companies. (Apple is
               | complying with this)
               | 
               | But Chinese companies HAVE TO assist the authorities in
               | obtaining systematic access to private sector data. (This
               | is not possible with E2E for backups and photos)
        
               | dannyw wrote:
               | Are you really arguing that because child pornography
               | exists, no large company should offer ETE photos?
               | 
               | Despite there been reasonable solutions like bloom
               | filters and client sided hash detection, so that known
               | child abuse material can be detected, without it needing
               | to compromise the privacy of 99.99999% of users?
               | 
               | And that photos present some of the most sensitive
               | materials on your device:
               | 
               | - geo-IP location showing basically everywhere you have
               | taken a photo in, ever since the dawn of time
               | 
               | - people's consensual sex tapes
               | 
               | - photos of passwords, account recovery codes, private
               | keys, seed words
        
               | headmelted wrote:
               | I'm arguing that because it exists no company of Apple's
               | size is going to risk unknowingly hosting it, and I
               | wouldn't either if I were in their shoes.
               | 
               | I agree with you in terms of photos being some of the
               | most private information we have, but the E2E argument
               | doesn't ever get won by the tech community without a
               | guarantee of blocking/catching/preventing CP and being
               | able to make that evidence available for prosecution.
               | 
               | To the arguments above: Any processing server side
               | implies no real E2E. Any processing client side is by
               | definition under the control of the client and subject to
               | forgery/hacking/spoofing/tampering.
        
               | philwelch wrote:
               | > Despite there been reasonable solutions like bloom
               | filters and client sided hash detection, so that known
               | child abuse material can be detected, without it needing
               | to compromise the privacy of 99.99999% of users?
               | 
               | This is not a good argument. "Known child abuse material"
               | is the tip of the iceberg. There's nothing stopping
               | people from creating new "child abuse material", and the
               | people who are doing that sort of thing are the ones who
               | are more important to catch.
        
               | oarsinsync wrote:
               | > geo-IP location showing basically everywhere you have
               | taken a photo in, ever since the dawn of time
               | 
               | Geo-IP is the process of taking an IP address and
               | attributing an location to that IP address.
               | 
               | I think you meant GPS location?
        
               | vngzs wrote:
               | In the bloom filter example, what device calculates the
               | hash inputs for the bloom filters? If it's the server,
               | then the server needs a copy of the image to check. So is
               | it the client? If so, how can you prevent a malicious
               | client from forging their hashes to be those of known-
               | safe images?
               | 
               | Not saying it's not possible to build an E2E image
               | storage service that also has the protections society
               | tends to demand. Just saying that I haven't seen anyone
               | do it yet, because these problems are subtle.
        
               | encryptluks2 wrote:
               | There are encryption options, just not with the software
               | provided by the storage providers.
        
               | modeless wrote:
               | Look at the Reuters article they linked. iCloud backup is
               | the issue. Usage of iCloud backup and Android backup are
               | probably very similar (in percentage terms), why would
               | you expect that Android backup is used less? They are
               | pretty much equivalent features, except that one is end-
               | to-end encrypted and the other is not. In both cases,
               | photos are handled separately.
        
           | headmelted wrote:
           | Yep, exactly that.
           | 
           | I utterly agree that other direct-to-consumer options are in
           | the same boat - but Apple is quite heavy-handed in it's
           | messaging about, well, messaging being encrypted and private
           | and no-one (including Apple) being able to read your
           | messages. That's only true if you don't backup to iCloud.
           | 
           | I would expect most people on HN to be aware of all of this
           | of course but when you're so strongly selling your privacy
           | protections as part of your brand, it's a pretty glaring
           | window to leave wide open.
        
         | InTheArena wrote:
         | I have very little respect for Youtube personalities (thinking
         | of LTT in particular) when it comes to talking about Apple in
         | particular. They are so wedded to their "everyone, except us,
         | is evil" perspective that their knee-jerk reaction to almost
         | anything from Apple, privacy or otherwise is negative. (LTT
         | spent the first bit trashing Apple for making marketing claims
         | about the M1, instead of letting them do, then refused to back
         | off when numbers backed up their claims, continue to trash
         | anything with Apple and privacy, etc).
         | 
         | Apple is not without sin. If we get out of this entire epic
         | lawsuit (another company not without sin) with consumers
         | winning the ability to side-load, it's a win. But for the most
         | part, Apple has a multi-decade history of usually working for
         | customers in above-board ways, as opposed to Facebook, Googles
         | and other(s).
        
         | varispeed wrote:
         | > I can't imagine this is going to win them any friends in
         | government circles but it's definitely a step in the right
         | direction.
         | 
         | Quite the opposite. Governments probably already have taps to
         | decrypted traffic.
         | 
         | Otherwise how come that would even be legal to run?
         | 
         | If someone commits a crime and government cannot find evidence,
         | because Apple gives shielding, then isn't that making them
         | hypothetically an accomplice?
        
           | JumpCrisscross wrote:
           | > _If someone commits a crime and government cannot find
           | evidence, because Apple gives shielding, then isn 't that
           | making them hypothetically an accomplice?_
           | 
           | We have recent and specific case law around this. The cherry
           | on top is it was Apple on the other side.
           | 
           | No, this is not how being an accomplice works in the U.S.
           | It's not how it works anywhere with the rule of law.
        
             | varispeed wrote:
             | Would you have a link?
        
               | JumpCrisscross wrote:
               | https://en.m.wikipedia.org/wiki/FBI-
               | Apple_encryption_dispute
        
           | gjsman-1000 wrote:
           | By the same logic, I'm the taxpayer who paid to help build
           | the highway that the drug kingpin used to get away during a
           | high speed chase. I'm an accomplice now.
           | 
           | I'm the scientist who purified the water that the criminal
           | used to get enough strength to run away. I'm an accomplice
           | now.
        
           | kergonath wrote:
           | > Otherwise how come that would even be legal to run?
           | 
           | Why wouldn't it be? I was under the impression that what
           | isn't forbidden by law was legal by default. AFAIK, running a
           | VPN platform isn't illegal.
           | 
           | > If someone commits a crime and government cannot find
           | evidence, because Apple gives shielding, then isn't that
           | making them hypothetically an accomplice?
           | 
           | I hate this argument. It's lazy and can be used to accuse
           | anybody in any context, and shut down discussions that we
           | should be having. By that standard we are all accomplices for
           | some crimes.
        
             | willis936 wrote:
             | >I was under the impression that what isn't forbidden by
             | law was legal by default.
             | 
             | Even beyond that, personal privacy from the government is
             | enshrined in the 4th amendment. Just because there was some
             | executive actions and illegal laws made does not mean the
             | 4th amendment suddenly disappears. No person or entity has
             | the right to dragnet all communications.
        
               | unknown_error wrote:
               | > personal privacy from the government is enshrined in
               | the 4th amendment
               | 
               | Yeaaaaah, let's just pretend Snowden and Manning never
               | happened.
        
               | [deleted]
        
               | willis936 wrote:
               | I'm doing the opposite. Saying that the fed is actively
               | engaging in illegal search and seizure is not ignoring
               | the whistleblowers that brought the scope of the issue to
               | light, it's acknowledging the issue.
        
               | unknown_error wrote:
               | The point is that the Constitution is largely
               | meaningless, feel-good fluffery that has no actual
               | bearing on which of our so-called rights are actually
               | available to us.
               | 
               | It's an aspirational document in a largely lawless land,
               | more a historical oddity than the supreme anything. If
               | you wait for legislators and law enforcement to fix
               | personal privacy, you've already lost... the US law
               | enforcement culture is actively hostile towards
               | individual rights because it makes their jobs harder. The
               | only real difference to, say, China, is that we like to
               | pretend otherwise. But the reality in the ground is that
               | nobody on the grid has had meaningful privacy for decades
               | now.
        
               | willis936 wrote:
               | >The point is that the Constitution is largely
               | meaningless, feel-good fluffery that has no actual
               | bearing on which of our so-called rights are actually
               | available to us.
               | 
               | IANAL but this sounds fundamentally wrong in every way I
               | interpret it. The Constitution is a set of laws that
               | cannot be contradicted by any other law, executive
               | action, or judicial action, with the exception of an
               | amendment.
        
               | kergonath wrote:
               | > No person or entity has the right to dragnet all
               | communications.
               | 
               | Indeed. And the fact that this is not recognised as a
               | fundamental human right is a serious limitation of the
               | charter and universal declaration. And yet, it comes up
               | regularly.
        
         | smoldesu wrote:
         | > I can't imagine this is going to win them any friends in
         | government circles but it's definitely a step in the right
         | direction.
         | 
         | Apple already has all the friends they need in the "government
         | circles". They're fully enrolled in PRISM and are well-known to
         | kowtow to the demands of corrupt leadership (see: Russian
         | iPhones, Chinese iCloud hosting)
        
           | snowwrestler wrote:
           | Apple is "fully enrolled" in PRISM just like any other
           | company with U.S. operations, because PRISM is the internal
           | NSA source designation for material acquired via FISA
           | warrants, and complying with FISA warrants is not optional.
        
         | mark_l_watson wrote:
         | I am running APple's betas for iOS, iPadOS, and macOS right now
         | - I really appreciate their implementing yet more privacy.
         | 
         | re: non-encrypted iCloud storage: I agree with you. I keep
         | medical and financial data encrypted (e.g., their Pages app
         | supports encrypting documents, and you can encrypt PDFs, etc.)
         | but I would rather they did this for me. That said, for the 90%
         | of my files that I would post on a street corner, I find iCloud
         | storage across my devices is handy.
        
           | Engineering-MD wrote:
           | But how secure is encrypted pages and PDF? My understanding
           | was it is not useful against a determined attacker and anyone
           | able to access your iCloud will be in this category.
        
         | nr2x wrote:
         | iClouds lack of encryption basically invalidates all other
         | promises they make.
        
           | LeoPanthera wrote:
           | If you believe this you have misunderstood how iCloud works.
        
       | SavantIdiot wrote:
       | Where are the Apple VPN exit points?
       | 
       | I wish there was a non-dubious VPN service with an exit in a non
       | GDPR country, or at least one with internet privacy. I rolled a
       | strongswan VPN through AWS EC2 but all the egress points are in
       | countries that can be exposed.
        
       | pdimitar wrote:
       | > _All in all, a very Apple approach: They deny themselves any
       | knowledge of a customer 's DNS queries and Web traffic, so if
       | served with a subpoena they have very little to respond with._
       | 
       | Maybe I am missing something but I view this is a rather genius
       | move. They have plausible deniability + actually introduce some
       | protection for their users.
       | 
       | Not sure how to read the original post though. Is it praising
       | Apple? Is it mocking them? We don't have to be polar of course, I
       | am just wondering.
        
         | yreg wrote:
         | >In one move, Apple has taken onion routing from a specialized
         | tool for hackers to something that will be in daily use on
         | billions of devices.
         | 
         | Sounds like praise to me.
        
         | smoldesu wrote:
         | Apple has claimed this shtick several times (as well as many
         | other VPN companies), but it actually requires a pretty
         | intricate software setup to pull off. The best VPN services
         | won't even have hard drives to store logs in: that way, even
         | individuals with a court-issued warrant can't get your info.
         | I'd imagine there's sufficient pressure on Apple from PRISM and
         | other governments to keep some level of rudimentary logs.
        
           | heavyset_go wrote:
           | > _The best VPN services won 't even have hard drives to
           | store logs in: that way, even individuals with a court-issued
           | warrant can't get your info_
           | 
           | Courts can compel them to log this information, so all claims
           | about not keeping logs are just theater. The second they're
           | ordered to by a court in the US, they will.
        
             | pwinnski wrote:
             | IANAL! The legal theory is that US courts can stop you from
             | taking actions, but cannot compel you to take actions.
             | 
             | So they can stop you from deleting existing logs, but they
             | cannot require you to collect logs you aren't already
             | collecting.
             | 
             | I have no idea how well this idea has been tested in court,
             | but that's the theory on which providers who don't even
             | have hard drives are relying.
        
           | saurik wrote:
           | (And if Apple has logs of which IP address accessed a
           | resource from which egress provider at a specific time, that
           | is often enough to do what most governments are looking
           | for... such is the limitation of two hops, and why Tor has
           | three. I truly hope Apple has designed their system to avoid
           | logging anything about their ingress packet flows.)
        
       | steveharman wrote:
       | "...why don't VPN providers implement a onion router.."
       | 
       | Pretty sure Nord already does. Probably others.
        
       | tyingq wrote:
       | I'm curious how they are securing the feature that keeps you in
       | the same region. Since that feature encourages content providers
       | to not block, it would be a desirable target to work around.
        
         | permo-w wrote:
         | yeah I was thinking about how difficult it might be to spoof
         | your location prior to the Apple Router, and have it come out
         | the other side nicely laundered
        
       | soheil wrote:
       | I think the title should be: Apple's iCloud+ "TOR-esque"
        
         | permo-w wrote:
         | Apple Routing
        
       | kibleopard wrote:
       | > The routing uses two hops; Apple provides the first, and
       | "independent third parties" (not yet specified) provide the
       | second.
       | 
       | This isn't true though, they have specified who the independent
       | third parties will be: CloudFlare Warp, Fastly, and Akamai. See
       | here: https://www.barrons.com/articles/fastly-stock-outage-
       | think-a...
        
       | amq wrote:
       | Potentially, this provides troves of data to the exit node
       | operators (CloudFlare, Fastly, Akamai, ...). Yes, it's the same
       | with all VPNs and ISPs, but I think users should be made aware
       | that now instead of your ISP analyzing the data, an even bigger
       | and more capable corporation is. And if Apple is controlling the
       | entire onion chain (I would be surprised if they weren't), they
       | have even more data available, mainly with a corresponding IP of
       | yours. In the net sum, you are hiding the transmitted data from
       | your ISP and the IP from the sites you visit, but you are handing
       | over all this information to a centralized place - Apple and exit
       | node providers. Potentially, they can use the information to
       | connect the dots more easily and fully than any ISP or site ever
       | could.
        
         | aeontech wrote:
         | This is not quite correct though - entry side and exit side are
         | specifically and intentionally not operated by same entities.
         | So Apple knows who you are but doesn't know what you're looking
         | for or where you're going - your traffic is passed straight
         | through to the exit layer. Exit layer operator knows what
         | you're looking for and where you are going but doesn't know who
         | you are or where you're coming from.
        
           | amq wrote:
           | The exit node operator can extract useful information even
           | without knowing your IP, especially until Encrypted Client
           | Hello (ECH) is ubiquitous.
        
       | Spooky23 wrote:
       | I think this is great, if only as a way to kill the bullshit
       | consumer VPN business, which sells snake oil.
        
         | wintermutestwin wrote:
         | Doesn't a consumer VPN keep my ISP from building a data profile
         | on me?
         | 
         | Yes, I get that now my VPN provider can build that data
         | profile, but I am certain that my ISP is a vile monopoly that
         | has corrupted the regulators that are supposed to represent me.
        
           | dehrmann wrote:
           | I have Sonic, so I trust my ISP more than a random VPN
           | provider. Even if you have AT&T, they have a legal team that
           | makes they provide a lot of opt-outs. I don't trust that they
           | work, but there are a lot more eyes on them than a VPN
           | provider.
        
         | izacus wrote:
         | > I think this is great, if only as a way to kill the bullshit
         | consumer VPN business, which sells snake oil.
         | 
         | Having a US megacorporation kill a whole market segment and
         | pull it into their monopolized walled garden sure seems like an
         | improvement. After all, they pinky promise they will not ever
         | abuse that! /s
        
           | massysett wrote:
           | By this logic our computer operating systems would not
           | improve, ever. Web browsers, built-in networking, music
           | players, image editors, mail programs, even Solitare - all
           | things that at one time were separate market segments.
        
             | izacus wrote:
             | All of those products have been improved by COMPETITION.
             | The most critical, most important and ONLY thing that makes
             | modern capitalism work for non-rich human beings.
             | 
             | Every single field you mention was thriving when there were
             | multiple players fighting over your money and have started
             | to become exploitative and abusive as soon as one player
             | killed the others and started rent-seeking. Competition is
             | crucial for market economy to work.
             | 
             | I find it utterly bizarre that someone educated would think
             | that a death of market by megacorp monopoly would somehow
             | drive improvement.
        
         | olivierestsage wrote:
         | I think that's painting with a pretty broad brush. What's wrong
         | with Mullvad, for example?
        
           | casefields wrote:
           | The issue here preference falsification:
           | 
           | >Preference falsification is the act of communicating a
           | preference that differs from one's true preference. The
           | public frequently conveys, especially to researchers or
           | pollsters, preferences that differ from what they truly want,
           | often because they believe the conveyed preference is more
           | acceptable socially.
           | 
           | The reason why the VPN business is booming is to avoid those
           | pesky content infringement letters, and to workaround geo
           | restrictions.
           | 
           | OP is upset that they advertise themselves as privacy tools,
           | but that's just marketing.
        
             | KingMachiavelli wrote:
             | Yea you don't legally market your product as a tool to
             | commit a crime but 'privacy' is pretty broad term and
             | partially true so it works.
        
           | dehrmann wrote:
           | VPNs mostly do what they claim, but they may or may not be
           | government or marketing honeypots, and a lot of the sales
           | pitches around hackers and privacy aren't as interesting in
           | the days of HTTPS. Aside from piracy and bypassing region
           | restrictions, you're just hiding your IP address, but those
           | change often enough already.
        
           | symlinkk wrote:
           | Who runs Mullvad?
           | 
           | I find it funny that people here mistrust companies like
           | Facebook and Google, but then turn around and hand off their
           | entire network activity to a faceless, anonymous VPN company.
        
             | wolverine876 wrote:
             | Have you tried answering that question? Mullvad isn't
             | faceless and anonymous.
        
             | olivierestsage wrote:
             | I think a lot of that distinction turns on how well your
             | network data is linked to your identity. In the case of
             | Mullvad, you can pay them anonymously by putting cash in an
             | envelope and just mailing it to them,[1] which lowers the
             | trust factor involved.
             | 
             | [1] https://mullvad.net/en/pricing/
        
         | VWWHFSfQ wrote:
         | what is bullshit about it
        
           | Spooky23 wrote:
           | You're "protecting" yourself against Starbucks monitoring you
           | by establishing a secure connection to a grey market entity
           | with more of an interest in your activity.
        
           | vmception wrote:
           | Internet reselling doesn't have nearly as much privacy as
           | internet resellers suggest
           | 
           | If you are only hiding from your local network and ISP its
           | fine
           | 
           | If you want to do that and change your location to a website
           | it's fine
           | 
           | If you are hiding from any government for a civil or criminal
           | charge it is not fine
           | 
           | If you are hiding from any government intelligence so nobody
           | knows anything it is not fine
           | 
           | It doesnt matter what "no logging" claims the internet
           | reseller has, this is not verifiable and can also change at
           | any moment
        
           | KMnO4 wrote:
           | Have you noticed all the ads say "Hackers can spy on your
           | connection when you log into your bank at Starbucks."
           | 
           | That's complete FUD. HTTPS completely avoids this issue (
           | _especially_ with a bank). Very few websites use HTTP now.
           | 
           | While VPNs do have their valid use (preventing your ISP from
           | spying, changing geolocation, and private networks for eg,
           | work), most of the marketing is spreading misinformation.
        
             | flixic wrote:
             | I've seen stats for a couple of the biggest VPNs. Massive
             | majority of their traffic is just switching geolocation
             | restrictions (US Netflix and similar).
             | 
             | They don't tend to advertise that. Some do, but it's not
             | their main message, because "prevent ISPs from spying" is
             | cleaner.
             | 
             | iCloud+ does not solve this, so there will be a sustained
             | need for VPNs, particularly those that invest effort into
             | into avoiding Netflix blacklists.
        
               | tpush wrote:
               | > They don't tend to advertise that.
               | 
               | IME of podcast advertising they all advertise this very
               | openly.
        
             | anonymouse008 wrote:
             | I've never understood how a VPN doesn't get too carried
             | away to pull a MITM with some central cert
        
               | gjsman-1000 wrote:
               | Because if you used a central cert, every device would
               | have to whitelist that cert, and just clocking the lock
               | icon in your browser would reveal it.
        
               | jen20 wrote:
               | Many consumer VPNs install a client, and it would be
               | trivial to ship a new trusted certificate with it.
        
               | acdha wrote:
               | This is true, but note that, for example, on iOS an
               | application can't do that without prompting. Now, most
               | people would probably hit "Approve" if one of their
               | security products said it was necessary.
        
               | gjsman-1000 wrote:
               | That wouldn't change that clicking the lock icon in your
               | browser would show the same certificate on every website,
               | and that this certificate was universally valid. Pretty
               | obvious...
        
               | AdamJacobMuller wrote:
               | > show the same certificate on every website
               | 
               | Not really, because, you can use on-demand certificate
               | issuance.
               | 
               | Hell, if you really want to, you can even name your
               | certificates the same as existing certificates and the
               | only way to detect the forgery would be to compare the
               | actual public keys (and who does THAT).
               | 
               | I feel like I'm writing an evil roadmap here, but, you
               | can even do multiple root certs with different names and
               | trust them all, do a whole "fake" PKI infrastructure
               | which would be impossible to detect unless you were
               | comparing the actual keys.
        
               | anonymouse008 wrote:
               | > I feel like I'm writing an evil roadmap here, but, you
               | can even do multiple root certs with different names and
               | trust them all, do a whole "fake" PKI infrastructure
               | which would be impossible to detect unless you were
               | comparing the actual keys.
               | 
               | Yeah, just imagine being beholden to some federal statue
               | impropriety (easiest in taxes) and running one of the
               | these vpn organizations...
        
               | 0x0 wrote:
               | If and when browsers start requiring pre-certificate
               | transparency logging, anything like this should no longer
               | be possible to pull off, since none of the fake
               | certificates would be able to contain a stapled pre-
               | certificate "signoff" from a trusted CT log.
        
               | throw0101a wrote:
               | > _Many consumer VPNs install a client, and it would be
               | trivial to ship a new trusted certificate with it._
               | 
               | A lot of browsers have their own root chain, and also now
               | do certificate pinning, so will (IIRC) only accept
               | specifically designated certs for particular sites
               | (doesn't Google/Chrome/Gmail do this?).
        
               | Nextgrid wrote:
               | On the other hand, a lot of VPNs provide proprietary
               | client software (even though all the major OSes have
               | built-in support for the common VPN protocols such as
               | IPSec, L2TP, etc) so they could very well sneak the root
               | cert in there too.
        
             | dehrmann wrote:
             | > "Hackers can spy on your connection when you log into
             | your bank at Starbucks."
             | 
             | I've also heard this from a reputable news source (NPR) in
             | the past few years, even though it hasn't been true for
             | banks for at least 15 years, ~5 for most websites.
        
       | o8r3oFTZPE wrote:
       | Here is a simple question: Why is there only one "Tor".
       | 
       | Why haven't there been more onion routing projects. (Maybe there
       | have been and I am just not aware.)
       | 
       | Perhaps the same reason(s) we never saw widespread adoption of
       | remote proxies, despite their usefulness in many situations.
       | 
       | Although in some respects onion routing seems quite an
       | improvement over "simple" proxies.
        
         | gabmiral wrote:
         | If I recall correctly, I2P uses some sort of onion routing.
        
         | marshray wrote:
         | The more nodes you have participating the more secure an onion
         | system tends to be. Since the Tor network can carry most kinds
         | of traffic, the motivation to avoid a fork is strong.
        
           | wolverine876 wrote:
           | > The more nodes you have participating the more secure an
           | onion system tends to be.
           | 
           | Tor isn't very large as it is, and (I would guess) it's the
           | largest. If another onion routing network didn't grow the
           | audience, you would have two even smaller networks.
           | 
           | > the Tor network can carry most kinds of traffic
           | 
           | Isn't Tor limited to routing TCP? That would rule out QUIC,
           | for example.
        
       | shp0ngle wrote:
       | I'm literally using VPNs just to get around geo-blocking.
       | 
       | Still, this is interesting.
        
       | bhaavan wrote:
       | My guess is one of the major reasons for having the exit nodes in
       | the same geo location as entry nodes is to have continuous
       | operations in China. Without this constraint, they would have
       | allowed chinese consumers to access the free web, which would ban
       | them instantaneously.
       | 
       | I don't think Apple cares as much about video content providers,
       | though.
        
         | gjsman-1000 wrote:
         | That's not the reason. In China, Myanmar, Egypt, and several
         | other countries this service will not be available at all.
         | Those customers will just have regular old iCloud.
         | 
         | A more likely reason is that video streaming services with
         | georestrictions like Netflix, Amazon, or BBC would have lost
         | their minds.
        
         | lxgr wrote:
         | > I don't think Apple cares as much about video content
         | providers, though.
         | 
         | Not being able to watch Netflix, Amazon Video etc. in Safari
         | seems like something Apple would in fact care about.
        
           | krferriter wrote:
           | Not if it gets them banned in those countries.
        
           | Mindwipe wrote:
           | HBO is blocking Private Relay regardless.
        
             | gjsman-1000 wrote:
             | Only for now. When it rolls out widely, Apple's sheer scale
             | will most likely force the issue.
        
               | Mindwipe wrote:
               | I doubt it, unless HBO and Apple are able to come to some
               | assurance on it.
        
         | whynotminot wrote:
         | I don't think this service is being offered in China, period.
        
         | simias wrote:
         | It wouldn't have been too hard to just implement this feature
         | for chinese customers if that was the only driver.
         | 
         | But I agree that making the exit node in the same country
         | probably goes beyond video content providers, it avoids all
         | sorts of potential legal, diplomatic and practical issues.
        
         | dehrmann wrote:
         | Apple also isn't in the business of people bypass region
         | restrictions. This seems focused on privacy.
        
         | smoldesu wrote:
         | Apple has always given in to China's demands. A few years ago
         | they even moved their entire Asian iCloud datacenter to the
         | China mainland after the government issued some vague
         | complaints about "nationalism" and "security".
        
       | danpalmer wrote:
       | Props to Apple for the design of this service. It doesn't hit all
       | the privacy targets that long-time personal VPN users might be
       | looking for, and it doesn't get into the game of trying to
       | circumvent region locked content*, but otherwise it's likely to
       | be a solid privacy improvement for almost all users in a careful
       | and deliberate way.
       | 
       | I use a VPN for other reasons (downloading Ubuntu ISOs mostly)
       | but I'll probably turn this on and leave it running on all my
       | devices because of how transparent it appears to be. I trust
       | Apple's onion-routing design more than I trust my VPN provider
       | not to log things.
       | 
       | * I'm actually glad they don't try to get around region locks. I
       | consume a lot of BBC content and live in the UK. I'm constantly
       | struggling with my VPNs (with UK endpoints) being blocked because
       | others outside the UK could be using them. It would be nice if
       | the BBC didn't block like this, but UK residents do typically pay
       | for the content whereas those outside the UK are unable to.
        
         | hammock wrote:
         | Which vpn do you use?
        
           | danpalmer wrote:
           | Private Internet Access.
           | 
           | I used to use NordVPN but found it to be much slower, less
           | stable, worse macOS integration, not as good on the privacy
           | front.
        
             | hammock wrote:
             | Do you have any thoughts on PIA vs Mullvad?
        
               | wolverine876 wrote:
               | PIA is owned by the person who owns Freenode, afaik. I
               | would certainly look into that before trusting them.
        
               | 1_player wrote:
               | FWIW, Mozilla VPN is based off Mullvad, which I've
               | enjoyed for a year to download Linux ISOs and I've never
               | had an issue with. Also they have one of the most
               | anonymous of setups (accept cash, crypto, no username or
               | passwords or personal details required, you're just given
               | a random account number you can add credit to)
               | 
               | NordVPN is oversubscribed crap.
               | 
               | PIA was founded by Andrew Lee, the big brain behind the
               | current Freenode drama, with help of the infamous Mark
               | Karpeles of Mt. Gox fame. I'd rather use something else.
        
               | bjoli wrote:
               | PIA is owned in a weird structure I don't understand in a
               | jurisdiction where any legal agreements with my home
               | country are, most likely, non-existant or untested. They
               | also seem to have enormous amounts on money to spend on
               | marketing or paying off torrent review sites.
               | 
               | Everybody recommends them, but all of these things make
               | me uneasy.
        
               | sa1 wrote:
               | After the recent freenode drama, best to avoid them.
        
         | NicoJuicy wrote:
         | > Props to Apple for the design of this service.
         | 
         | I was under the assumption that it was mostly Cloudflare Warp
         | repackaged with a different name?
        
           | defaultname wrote:
           | That would be an incorrect assumption. It's an onion that
           | goes to Apple first and then to a variety of external vendors
           | -- Fastly, Cloudflare, Akamai, and likely others.
        
         | kergonath wrote:
         | > It would be nice if the BBC didn't block like this, but UK
         | residents do typically pay for the content whereas those
         | outside the UK are unable to.
         | 
         | As an exiled Londoner, I would love to be able to pay to access
         | BBC programmes. Unfortunately I can't, so a VPN is often the
         | only solution (well, I guess torrenting would be another one,
         | but it's not really better).
        
           | dylan604 wrote:
           | If only there was a way to store a user's information so that
           | they could be identified with some sort of a login process
           | that would indicate that they are a current valid member. It
           | would also be impressive if this same system would allow the
           | user to indicate that they are currently abroad to allow a
           | temporary exemption of geofencing.
           | 
           | Obviously, this is something licensing agreements do not
           | allow for, but it seems like such an obvious user friendly
           | concept that it will never be allowed.
        
           | rlaabs wrote:
           | BBC Select is another option for BBC documentaries if you
           | have either Amazon Prime video or an Apple TV.
           | 
           | https://www.bbcselect.com/
        
           | robotresearcher wrote:
           | BritBox is a neflix-like service that has UK shows from the
           | BBC and ITV. Decent catalog.
        
         | [deleted]
        
         | loloquwowndueo wrote:
         | Why do you use a VPN to download free and publicly available
         | iso images? (Ubuntu). Just curious.
         | 
         | Do you download directly from a mirror or use BitTorrent for
         | this? (If the latter I think I kind of understand the rationale
         | for the VPN)
        
           | bjoli wrote:
           | My ISP throttles bittorrent traffic.
        
           | chrisfinazzo wrote:
           | Until a few months ago, I had never really used BitTorrent to
           | do anything - save for about 20 minutes back in HS almost 20
           | years ago (!)
           | 
           | (I _think_ I was running uTorrent on Windows, it was weird
           | and I really didn 't know how to use it.)
           | 
           | However, in order to "acquire" [this][1], torrenting was
           | realistically the only sensible option I had. A direct
           | download from the Internet Archive would have taken roughly 7
           | hours @ 100 Mb/s. The torrent file was done in an hour.
           | 
           | To my great surprise, the link isn't dead, so...yeah :)
           | 
           | Transmission CLI FTW.
           | 
           | [1]: https://www.caseyliss.com/2021/2/14/a-concert-for-
           | charlottes...
        
             | vultour wrote:
             | 13GB would take less than 20 minutes at 100Mbps.
             | Regardless, I'm not sure why you only consider near instant
             | downloads "sensible". I often spent several days
             | downloading things when I was younger.
        
           | syntaxstic wrote:
           | Probably because of this -
           | https://arstechnica.com/gadgets/2021/05/fake-dmca-
           | takedown-n...
        
           | xuki wrote:
           | linux iso is code for pirated content
        
             | Jiocus wrote:
             | And here I was, still thinking Linux was _" an illegal
             | hacker operation system, invented by a Soviet computer
             | hacker named Linyos Torovoltos, before the Russians lost
             | the Cold War"_.
        
           | yunohn wrote:
           | "Ubuntu ISOs" is a common euphemism for pirated content like
           | media or games.
        
           | [deleted]
        
           | [deleted]
        
           | [deleted]
        
         | krageon wrote:
         | > but UK residents do typically pay for the content whereas
         | those outside the UK are unable to.
         | 
         | In essence, what you're saying boils down to "it's already paid
         | for, but nobody else can have it anyway". It's unreasonable and
         | there is no need to make excuses for this behaviour.
        
           | 867-5309 wrote:
           | totally agree. I had no end of shit trying to watch BBC News
           | channel from abroad. I'm a UK national, I own a house in the
           | UK, I pay UK taxes, I pay your stupid TV licence fee, you're
           | broadcasting live over 3 separate CDNs, just let me watch the
           | fucking news. I eventually subscribed to an illegal IPTV
           | service for that one sodding channel. I don't even need the
           | other 17,000 channels. the BBC drove me to it
        
             | herbstein wrote:
             | Completely off-topic: great choice of name. That number is
             | burned into my mind, and will be forever
        
               | 867-5309 wrote:
               | cheers ;)
        
               | mikecarlton wrote:
               | Still more off-topic: I can only read it as 86-75-309
        
               | 867-5309 wrote:
               | the joy of fitting 7 beats into a 4/4 signature
        
               | UncleEntity wrote:
               | To continue the off-topicness...
               | 
               | That number almost always works for store 'loyalty
               | program' discounts too.
               | 
               | <local area code> 867-5309
        
             | mavhc wrote:
             | Not running a vpn from your house?
        
               | 867-5309 wrote:
               | the tenants wouldn't approve (they pay for elec and
               | internet). plus I'm away for twelve months so no chance
               | of onsite troubleshooting, physical reboots after power
               | outages, etc.
        
               | larkost wrote:
               | So, you are saying that the TV license you are paying for
               | is actually being used by the renters in the house you
               | own. Is that a fair statement? That puts a bit of a
               | different spin on it.
        
               | 867-5309 wrote:
               | due to the timing of things, I prepaid for ten twelfths
               | of their residence. I didn't seek recompense as I knew I
               | would be consuming one channel. I am unaware if the
               | tenants use a tv
        
             | vanburen wrote:
             | It may be worth looking at the AAISP L2TP Service[1].
             | 
             | They are a domestic ISP, so I guess iplayer should work
             | over the service.
             | 
             | [1]: https://www.aa.net.uk/broadband/l2tp-service/
        
               | 867-5309 wrote:
               | looked interesting, but is around double the price for
               | around max 2 hours viewing per day, with no guaranty of
               | supporting BBC streams. from experience I'll presume they
               | know about this service and are actively blocking their
               | subnet
               | 
               | I'm paying around half the price for unlimited viewing of
               | direct streams (no faffing with client protocols) which
               | come transcoded for home and mobile usage
        
           | criddell wrote:
           | It really hasn't already been paid for. For example, say you
           | are a composer who wrote some music for a BBC series. You get
           | paid more for something in wide release than for something
           | released only in the UK.
        
           | andyjh wrote:
           | Licensing issues aside, it would cost _additional_ money to
           | actually serve all that content to a global audience
           | (shipping bytes over the internet isn't free).
        
             | 867-5309 wrote:
             | yet they deliver over 3 CDNs, yes THREE, for a maximum
             | viewership of one country
        
           | danpalmer wrote:
           | Yes you're right, I was giving a reason more than an excuse.
           | I don't think they should be doing it.
        
           | JumpCrisscross wrote:
           | > _what you 're saying boils down to "it's already paid for,
           | but nobody else can have it anyway"_
           | 
           | This is already paid for but the next show isn't.
           | 
           | If the BBC were sold to the public as a soft dollar
           | expenditure, it would be one thing. But it wasn't. I'm not
           | sure it could be in today's Britain. Ignoring the freeloader
           | problem threatens the support on which the BBC's funding
           | depends.
           | 
           | This is a debate with reasonable arguments on both sides.
        
           | mtsr wrote:
           | It's generally down to the terms for content that networks
           | (BBC in this case) buy licenses to. The IP owners don't want
           | the networks to allow the whole world access to that content
           | for the price that the network is willing to pay to show it
           | to their region.
        
             | subpixel wrote:
             | But also, and mostly, in reverse. The BBC is the producer
             | and license owner of a ton of programming, and rather than
             | offer that to the world for a subscription fee, they choose
             | to offer it to select partners (previously mainly PBS, now
             | Netflix and Amazon) for a licensing fee, or sometimes in a
             | coproduction arrangement.
             | 
             | This is big money, up-front, with no need to build out a
             | global delivery system or deal with millions of customers.
        
               | Mindwipe wrote:
               | > The BBC is the producer and license owner of a ton of
               | programming
               | 
               | The BBC is complete license owner of virtually zero
               | programming. Almost all (as in 99.9%+) of their content
               | uses substantial third party copyright works where the
               | cost implications of selling internationally still apply
               | (just the music rights alone will drive you mad, and it's
               | far from uncommon for BBC content that is shown in the UK
               | to have a different soundtrack to the internationally
               | sold version to the likes of Netflix due to the licensing
               | cost and complexity).
               | 
               | It is also worth noting that the BBC makes a lot less
               | than people think, especially if you consider BBC studios
               | to be a quasi-separate production entity now (which it
               | is!).
        
               | hnlmorg wrote:
               | The BBC aren't allowed to. There are very strict terms in
               | which the BBC can operate. So what they have to do is
               | sell to subsidiaries like BBC America. And there in lies
               | the licensing issues described in the GPs post.
               | 
               | This is one of those classic examples of something that
               | looks really simple from an outsiders perspective but
               | once you have to deal with the details you realise it's
               | anything but simple. And through no fault of the BBC
               | either, I might add. Various commercial stations and news
               | outlets have campaigned relentlessly to shut the Beeb
               | down. It's a miracle the service is still operating, even
               | if their hands are tightly tied.
        
               | kmeisthax wrote:
               | More generally, geographic licensing maximizes revenue
               | without damaging brand goodwill for the vast majority of
               | customers, so pretty much everyone is going to do it.
               | 
               | Hell, I thought the practice would die (or at least slow
               | down) when Netflix started transitioning away from
               | syndicated TV and movies; this never happened. Netflix
               | will totally geoblock _their own shows_ so they can, say,
               | release a cartoon on a weekly basis in Japan but in
               | binge-watchable chunks in America.
               | 
               | You will continue to see anything more premium than a
               | high-subscriber-count YouTube channel be geoblocked until
               | and unless one of two things happens:
               | 
               | - Geoblocking gets so heinous that it starts to push
               | people away from shows and services, beyond ordinary
               | subscriber churn. This is unlikely - the US is the
               | biggest market for a lot of this stuff, and that's a
               | market full of people who have no desire to watch foreign
               | media ahead of an official release. Hell, most of us
               | don't even have _passports_ , and think that you can just
               | move to another country by _asking politely_.
               | 
               | - Some country or trading bloc gets enough of a bug up
               | their butt about getting releases late that they start
               | amending copyright law to ban the practice. AFAIK, I've
               | heard Australia was considering banning region locked DVD
               | players at one point; and that the EU was considering
               | forcing online video providers to license content on an
               | EU-wide basis.
        
               | withinboredom wrote:
               | > the US is the biggest market for a lot of this stuff
               | 
               | I have a funny feeling that a very large percentage of
               | that market comes from VPNs. Everyone I know watches the
               | US Netflix and we aren't in the US.
        
               | 867-5309 wrote:
               | of all the streaming services, I have found Netflix to be
               | the one that cares least about geoblocking. they appear
               | to care on the outside to appease the production outlets,
               | but on the inside they don't appear to block or
               | discourage VPNs at all. unlike the BBC who actively, and
               | aggressively, geoblock their content
        
               | nindalf wrote:
               | GP wanted to watch BBC News in particular. I don't think
               | there's any licensing issue with that, surely?
        
               | Mindwipe wrote:
               | > GP wanted to watch BBC News in particular. I don't
               | think there's any licensing issue with that, surely?
               | 
               | Ha! There's SO SO MUCH. More than you can imagine.
        
           | [deleted]
        
         | Jiocus wrote:
         | > I use a VPN for other reasons (downloading Ubuntu ISOs
         | mostly).
         | 
         | This made me smile. Good one.
         | 
         | For context, copyright trolls recently tried to extort torrent
         | users for downloading and sharing Ubuntu ISOs.
        
           | rrrrrrrrrrrryan wrote:
           | "Linux ISOs" has been slang for a very long time:
           | 
           | https://www.urbandictionary.com/define.php?term=Linux+ISO&am.
           | ..
        
             | Jiocus wrote:
             | Thanks for clarifying. I've not encountered the use before,
             | maybe because here in the Nordics piracy has been -is- very
             | normalized.
             | 
             | The other reply told about a uni tale. I've heard about a
             | similar story about someone torrenting actual Linux ISOs on
             | university network. That resulted in a stern warning else
             | the student would be barred from using the network and
             | computers. Basically an automatic fail for future studies.
        
             | gbil wrote:
             | Anecdote from my MSc year in 2003. In the dorm room I had
             | 10Mbps Internet connection via the University's network
             | which was quite amazing for the time. So among the real
             | Linux ISOs, I tormented also the other kind of ISOs. At
             | some point the Uni NOC reached out telling me that I'm
             | consuming lots of BW for torrents which is against the
             | policy, at which I replied that I download Linux ISOs and
             | I'm happy to schedule it for after midnight, outside of
             | peak hours. After some days I get a reply that please do so
             | from another guy who forgot to remove the quote from his
             | previous colleague which went something like "hey we have a
             | problem with this guy's answer"
             | 
             | So yes, Linux ISOs is an old thing indeed
        
           | judge2020 wrote:
           | If you want to give context, a link to the story would be
           | nice:
           | 
           | https://arstechnica.com/gadgets/2021/05/fake-dmca-
           | takedown-n...
           | 
           | Importantly, OpSec (the company doing this torrent-dmca-for-
           | hire stuff) says the DMCA itself was spoofed
           | 
           | > OpSec Security's DCMA notice sending program was spoofed on
           | Wednesday, May 26, 2021, by unknown parties across multiple
           | streaming platforms.
        
             | DaiPlusPlus wrote:
             | ...who names their company "OpSec"? Are they actively
             | wanting to be made fun-of at the next defcon?
        
               | kalleboo wrote:
               | Is anything worse than "Web Sheriff"?
               | 
               | https://en.wikipedia.org/wiki/Web_Sheriff
               | 
               | https://web.archive.org/web/20090122235038/https://thepir
               | ate...
        
               | zrobotics wrote:
               | I mean, they're willing to work for ISPs doing torrent
               | detection, which has been a scummy business from the
               | start. Somehow, I would imagine they would be even less
               | respected than the feds at defcon, since the feds
               | actually do technically challenging things occasionally.
        
               | [deleted]
        
             | Jiocus wrote:
             | Of course it was a false flag issue, it never made sense
             | from the beginning.
        
               | paranoidrobot wrote:
               | In a world where white noise[1], birdsong[2] and someone
               | playing Beethoven on the piano[3] get copyright
               | strikes/takedown notices - I don't think someone getting
               | a copyright notice for downloading Ubuntu is that far
               | fetched.
               | 
               | [1] https://www.bbc.com/news/technology-42580523
               | 
               | [2] https://news.ycombinator.com/item?id=3637124
               | 
               | [3] https://news.ycombinator.com/item?id=27004577
        
           | wmf wrote:
           | The sad thing is that actual Linux ISOs are so over-mirrored
           | that using BitTorrent generally has no benefit and may be
           | slower.
        
             | Jiocus wrote:
             | High availability (through mirrors) is still a good thing.
             | My experience is that torrent files are sometimes a lot
             | faster, sometimes less so. Just as mirrors.
        
         | mkr-hn wrote:
         | They get some by way of their portion of most Americans' cable
         | bills from BBC America.
        
         | cwizou wrote:
         | > trying to circumvent region locked content
         | 
         | Semi-related to this, but they do offer an option to pick
         | between preserving your approximate location and using a
         | broader location.
         | 
         | The example they took in one of the sessions was, if you live
         | in San Jose, with the first option, you'll get an exit node
         | near San Jose so you can still get local "content". With the
         | second one, you could get an exit node in Los Angeles.
         | 
         | In practice in Europe, it looks a bit different. I do live in
         | the north west of France, and with the first option I regularly
         | get an exit node in the southwest of France (from Fastly),
         | about 700km away (which is pretty fine by me).
         | 
         | With the second one however, I get exit nodes in Germany and
         | the Netherlands (pretty much exclusively Cloudflare), which can
         | become an issue with region locked content. I had the issue
         | with Prime Video last week not offering me a Tennis match for
         | which they only bought rights for in France.
         | 
         | Obviously it's still early and they might tighten a bit the
         | locations outside of the US, but overall it's definitely quick
         | and well thought out.
         | 
         | Last thing, all your traffic from Safari (and presumably some
         | other Apple services ? Still unclear) whether http or https
         | will be routed through it. Only http traffic from 3rd party
         | apps (Firefox, curl etc) is routed through the relays, which I
         | think is a pretty sensible default.
        
         | fnord77 wrote:
         | I wish I could pay for bbc iPlayer service outside old blighty.
         | But they don't allow it.
        
           | ptaffs wrote:
           | This is as much to do with their content license agreements
           | as it is BBC being disinterested. Material BBC licenses to
           | distribute, they are limited to the UK, and content BBC
           | licenses to foreign TV presumably can't be also distributed
           | to that same region. There is a service BBC run which allows
           | those outside the UK to stream some content
           | (https://www.britbox.com/us/).
        
           | xnyan wrote:
           | smartdnsproxy.com - 2 weeks, no credit card needed. Works
           | perfectly and you don't need to use a VPN, just one of their
           | DNS servers.
        
             | fnord77 wrote:
             | this is showing up as a malicious site.
        
             | easrng wrote:
             | I took a look at this, it seems the way it works is when
             | you do a DNS lookup it does a lookup itself and rewrites
             | the IPs before returning to you. It stores a mapping of
             | client IP and rewritten IP to real IP and when it gets a
             | request on the rewritten IP it looks up the original and
             | proxies the request. Pretty cool, but I wouldn't trust it
             | with anything unencrypted. It offers no privacy benefits.
        
           | ska wrote:
           | You still can in some places if I recall correctly. Notably
           | not in US due to licensing disagreements (of course).
        
             | rrrrrrrrrrrryan wrote:
             | Like, commonwealth nations? Or just countries too small to
             | bother with the legal fees?
        
               | ska wrote:
               | Like, you can download BBC iPlayer (or could) and pay a
               | fee. For UK license fee payers, the app and content is
               | free.
               | 
               | I don't think the content was identical, but it was
               | pretty broad. Some EU countries, maybe Canada?, at least.
        
       | maxpert wrote:
       | I don't really mind paying few bucks for privacy. But I think
       | Apple in the process is gonna kill a lot VPN providers. While I
       | don't care right now I hope it doesn't make Apple a monopoly.
        
         | gjsman-1000 wrote:
         | It won't harm VPN providers, I don't think, for a few reasons.
         | 
         | - VPNs are actually less private than iCloud+ double hop
         | design, but could be much faster due to only having a single
         | hop.
         | 
         | - Unlike a VPN, you can't choose the location of the server you
         | exit at, and the exit server cannot be in a different nation.
         | If you are in the US, iCloud+'s relays are in the US. No
         | circumventing georestrictions here.
         | 
         | - Apple does not market their service as a VPN and never said
         | it is one. For most customers, they don't know this is a VPN
         | substitute because it doesn't call itself one. So if you have
         | "VPN" in your mind, this isn't something you think of as an
         | option.
        
           | CubsFan1060 wrote:
           | Additionally, this only works for port 80 traffic from apps.
           | Other traffic is not run through this, so a VPN would still
           | be useful in those scenarios.
        
             | mariojv wrote:
             | To clarify: port 80 and 443 (TLS connections), right? Or is
             | TLS traffic only routed through the private relay in
             | Safari, not other apps?
        
               | gjsman-1000 wrote:
               | All traffic in Safari goes through relay. However, in 3rd
               | party apps, all traffic over 80 goes through relay and
               | traffic over 443 is exempt. There is going to be an API
               | though for if you want your 3rd party app's 443 to go
               | over the relay if you desire.
        
               | 0xf00fc7c8 wrote:
               | Not in beta1. I tcpdump'ed traffic from Firefox. HTTP/80
               | traffic is perfectly visible and not pushed to
               | mask.icloud.com
        
             | gcbirzan wrote:
             | Wait, so no HTTPS?
        
         | kalleboo wrote:
         | Everyone I know who uses a VPN doesn't really care about
         | Privacy with a big P (i.e. state actors etc), they either use
         | it to get around geo-blocks or to conceal their use of
         | BitTorrent and maybe porn sites and this only seems to cover
         | the last of those.
        
       | whiteboardr wrote:
       | Actually surprised how this only shows up on HN now.
       | 
       | Expected this to take the top spot right after the keynote.
        
       | bhaavan wrote:
       | Does this mean that all DDoS mitigation techniques need to exist
       | before the exit node of this traffic? Which in turn mean, that
       | everyone needs to outsource their DDoS mitigation to Apple.
       | 
       | Also the corollary would be, that anyone who is able to bypass
       | the protection mechanisms Apple has in place to control DDoS, can
       | use it to DDoS a service like Google, Microsoft and get the
       | entire service banned for all iCloud+ users. Right?
        
         | gjsman-1000 wrote:
         | Apple has sort of addressed this with only having it work with
         | Safari and other apps that implement the API, rather than
         | system-wide as something you can connect to. It's probably
         | going to take a lot of reverse engineering before hackers
         | figure out the API and how to get third party devices to
         | connect and authenticate, if at all. If you can't get third
         | party devices to connect, you are missing the first D in DDOS.
        
           | mariojv wrote:
           | There is also almost certainly an authentication mechanism in
           | place, even if you were to reverse engineer the API. You'd
           | need a bunch of paid iCloud accounts to have a DDoS be at all
           | feasible with this service.
           | 
           | Additionally, Cloudflare themselves, one of Apple's third
           | party partners, offer DDoS protection services. Because they
           | see all the exit traffic, they'd be able to detect the DDoS
           | and block it.
        
             | Ensorceled wrote:
             | That's why this concern seemed weird to me; the exit nodes
             | ARE the DDoS protection services.
             | 
             | I can't see Cloudflare putting themselves in the position
             | of needed to protect their clients from themselves ...
        
               | gjsman-1000 wrote:
               | Otherwise, by the poster's logic, why hasn't CloudFlare
               | been a DDoS vector?
        
         | Ensorceled wrote:
         | Why are you assuming this can, and will, be readily used as a
         | DDoS vector?
        
       | Operyl wrote:
       | So far the two different third parties I've seen are Cloudflare
       | and Akamai. Has worked relatively well here, besides the fact
       | that some bug has made it so it turns back on randomly, which
       | isn't a big deal.
        
       | soheil wrote:
       | This could also mean now major companies security teams have even
       | more incentive to track onion routing users and to check their
       | pattern of traffic to ensure they are legitimate Apple users and
       | not some tor user instead of just blanket-blocking every tor
       | user. This could make tor less secure in the long term if more
       | open source/closed source projects (NSA notwithstanding) are
       | started and dedicated to analyzing and delayering tor traffic.
        
       | vngzs wrote:
       | From Apple's statement[0]:
       | 
       | > The first assigns the user an anonymous IP address that maps to
       | their region but not their actual location. The second decrypts
       | the web address they want to visit and forwards them to their
       | destination. This separation of information protects the user's
       | privacy because no single entity can identify both who a user is
       | and which sites they visit.
       | 
       | Apple is not saying nobody can deanonymize you - they are being
       | very careful to only state that no single entity can deanonymize
       | you. Hence you should still assume this is not a good protection
       | against any entity with subpoena power, or the ability to compel
       | the cooperation of Apple and their 3rd-party egress relay
       | providers.
       | 
       | [0]: https://9to5mac.com/2021/06/07/apple-icloud-private-relay-
       | fe...
        
         | allochthon wrote:
         | That makes me wonder whether an analysis could be done over a
         | long period of time to determine where in the region the user
         | isn't, and thereby narrow down where the user is.
        
           | bjtitus wrote:
           | I'm curious what the details around the anonymous IP address
           | assignment are. Protecting copyright holders seems to be the
           | point of the IP assignment to not break content restrictions.
           | 
           | Are they able to assign a set for an entire country? If so,
           | that doesn't narrow it down all that much. However, major
           | league sports blackouts wouldn't work, so is it by city?
        
       | ROARosen wrote:
       | > or you can view it as a concession to reality: If Apple didn't
       | do this, the video providers would block their exit nodes, as
       | they do with any VPN provider that gets large enough for them to
       | notice.
       | 
       | I seriously doubt any reasonable video streaming service would
       | cut off such a huge chunk of their user base just because they
       | are using an iPhone.
        
         | grantcox wrote:
         | I expect they would just show a message "to view our content,
         | download our app - Safari is not supported"
        
           | spideymans wrote:
           | But when you download the app: "please use safari to pay for
           | subscriptions" :)
        
       | modernerd wrote:
       | > It's not clear if the API will be public for other browsers or
       | applications to use.
       | 
       | Apple has already confirmed that other app traffic will go
       | through iCloud Private Relay "no matter what networking API
       | you're using", with some exemptions:
       | 
       | > Not all networking done by your app occurs over the public
       | internet, so there are several categories of traffic that are not
       | affected by Private Relay.
       | 
       | > Any connections your app makes over the local network or to
       | private domain names will be unaffected.
       | 
       | > Similarly, if your app provides a network extension to add VPN
       | or app-proxying capabilities, your extension won't use Private
       | Relay and neither will app traffic that uses your extension.
       | 
       | > Traffic that uses a proxy is also exempt.
       | 
       | From https://developer.apple.com/videos/play/wwdc2021/10096/.
        
         | ls612 wrote:
         | So will this mean if I'm using Cloudflare 1.1.1.1 that I won't
         | get the iCloud private relay since they implement DoH as a VPN
         | in iOS?
        
           | jedisct1 wrote:
           | DNSCloak still works with Private Cloud.
        
           | firloop wrote:
           | Not super familiar with 1.1.1.1, but I use NextDNS and it's
           | no longer implemented as a VPN - they use the native iOS
           | encrypted DNS feature. I wonder how iCloud Private Relay
           | works with that.
        
             | richbradshaw wrote:
             | I have the beta and it currently doesn't appear to work.
        
       | beermonster wrote:
       | This is interesting. I think overall I approve as it benefits
       | people by default.
       | 
       | It does mean you now have to trust Apple since that's the first
       | hop. However you're already doing this when you spin up your AWS
       | Lightsail Wireguard instance, say. AWS can see ingress and egress
       | traffic and so you just need AWS to not be part of your threat
       | model. Same here. Though I dont see this as too much of a problem
       | since it applies to devices and services where you've already
       | made this explicit choice.
       | 
       | The app limitation thing is a shame and hopefully there will be
       | an API at a later date.
       | 
       | The exit node choice based on exit-locality kinda makes me think
       | Apple either:
       | 
       | - Want to restrict this service being (ab)used for geolocked
       | content (Netflix etc)
       | 
       | - Want to speed up the service by providing the closest exit node
       | (Performance)
       | 
       | Of course given all the FBI cases, you also have to consider
       | other possibilties for the creation of this service.
        
         | joshstrange wrote:
         | Craig Federighi, on the most recent episode of The Talk Show
         | with John Gruber [0] about 47 minutes into the episode, talked
         | about this and I think both your assumptions are correct. For
         | the first one I'm sure they didn't want to deal with the
         | complexity of picking an exit location nor did they want to be
         | a party to getting around geo-locking and so this gave them the
         | best of both worlds, no UI and no issue with geo-blocking. For
         | the second point I think that is also the reason as well as
         | it's often helpful if a website knows your general location
         | (For relevant recommendations, CDN routing, etc) but we'd
         | prefer if the website didn't know exactly where we are coming
         | from (IP-wise) which can be used for tracking/ads.
         | 
         | [0] https://daringfireball.net/thetalkshow/2021/06/11/ep-316
        
       | Brajeshwar wrote:
       | Does this compare to NextDNS[1]. I moved from Pi Hole[2] to
       | NextDNS and I'm happy with it.
       | 
       | 1. https://nextdns.io
       | 
       | 2. https://pi-hole.net
        
         | KMnO4 wrote:
         | Just curious, are you on the free tier? Just wondering if 300k
         | queries per month is sufficient for the average person. I have
         | no reference to base that number on.
        
           | gnicholas wrote:
           | I'm on the free tier and haven't hit the cap.
           | 
           | I've also found that I still get creepily-targeted
           | advertising, which is presumably based on IP. For example, I
           | watched a youtube video in Firefox Focus on my iPhone. Later
           | that day, I saw a youtube recommendation for a very similar
           | video (on a topic that I do not ever engage with, except for
           | the single video earlier that days) on my laptop, in Safari.
           | 
           | I use NextDNS on both devices. It's nice, but it's not a
           | silver bullet.
        
           | decrypt wrote:
           | I was on the free tier but hit 300k requests in roughly 25
           | days. My primary smartphone, laptop, and parents'
           | smartphones. Upgraded to NextDNS, happy customer for an year
           | but jumped ship to pihole. Have two pihole devices on the
           | Tailscale network. NextDNS was great. Checks all of my
           | requirements. Just wanted to support open source software. I
           | donate to pihole often instead.
        
           | Brajeshwar wrote:
           | I'm on the paid tier. I pay the yearly subscription. Our
           | family of four (2 kids) easily hit 1+ Million queries a
           | month.
        
         | marceldegraaf wrote:
         | No. NextDNS and Pi-Hole serve DNS requests and are mainly used
         | for ad blocking and content restrictions on your network. They
         | don't tunnel or redirect your actual internet traffic the way a
         | VPN does.
        
           | yegor wrote:
           | Shameless self-plug: NextDNS does not, but ControlD does do
           | that - https://controld.com
        
             | corobo wrote:
             | Your service seems to support the same features as your
             | provider -- are you 1:1 reselling or do you add stuff?
        
               | yegor wrote:
               | Not sure what you mean by that. The features are not the
               | same, see https://kb.controld.com/compare
        
           | lucasverra wrote:
           | This is the correct observation.
           | 
           | - A nextDNS user having that same question answered by
           | official team
        
         | arnvald wrote:
         | Oh, that's interesting. What convinced you to switch? Not
         | having to host it yourself or some specific features?
        
           | aPoCoMiLogin wrote:
           | i'm not the OP but I think it might be the issue with
           | exposing pi-hole to the internet to access the dns outside of
           | your home network. nextdns is cheap, i'm using it on all my
           | devices, without the hassle to expose pi-hole to the
           | internet.
        
           | Brajeshwar wrote:
           | More of Not Hosting it Myself. NextDNS is cheap enough and
           | does the work really well. Part of my lifestyles
           | simplification, especially when it comes to critical
           | services.
           | 
           | Had few instances where some websites do not work when ad
           | scripts are blocked. I had to debug while traveling and my
           | wife is not too keen on tinkering with the Raspberry Pis.
           | 
           | NextDNS have similar issues, lots of newsletter
           | unsubscription just fails. For NextDNS, I can just ask my
           | wife, "Click that Shield Icon and Disable for sometime." For
           | Mobile devices, "Open NextDNS and slide the Disable button."
        
       | basisword wrote:
       | I'm currently running the beta and this doesn't work on my router
       | (provided by one of the largest ISP's in the UK). When I go to
       | settings it displays a message that the router is unsupported by
       | private relay. Hopefully it's something they can fix before
       | launch but if not I wonder how many other routers are
       | unsupported?
        
       | dcow wrote:
       | Isn't iCloud+ "VPN" (Private Relay) just white-labled Cloudflare
       | Warp? Is "onion router" a new development or is Jerry
       | overzealously inferring there's more than meets the eye here?
        
       | ComodoHacker wrote:
       | >why don't VPN providers implement a onion router
       | 
       | ProtonVPN does.
        
       | Grustaf wrote:
       | > An big tradeoff for some is that the exit node is always chosen
       | to be in the same geo location as the entry node. You can view
       | this as a sop to the various on-line video providers
       | 
       | How could it be a "sop" to video services, isn't it exactly what
       | they want, no more no less?
        
         | pwinnski wrote:
         | What video services really want is for each user to be
         | identifiable by IP address. This doesn't quite give them that,
         | but it does region-lock them.
        
           | Grustaf wrote:
           | Why do they want that though? They can still remember you,
           | right, since you're logged in?
        
             | pwinnski wrote:
             | Not all media sites require one to be logged in.
             | 
             | However, there are _many_ reasons why a video service might
             | want each user to be individually identifiable by IP.
             | 
             | - Many media items are contractually region-locked
             | 
             | - The same user from too many simultaneous IPs might mean
             | shared credentials, a perceived loss of revenue
             | 
             | - The same user from geographically disparate IPs might
             | also mean shared credentials, even if not simultaneous.
             | 
             | I'm sure there are more.
        
       | vmception wrote:
       | Apple should release a token for the routing nodes to stake and
       | get slashed for poor quality connectivity
        
       | a-dub wrote:
       | sounds awesome! tor as a system service with a professionally
       | managed network. beyond making ad tracking harder, i wonder what
       | sorts of new application spaces this may open up. i can already
       | think of one! (and no, it's not some shady illegitimate/illegal
       | bs)
        
       | fossuser wrote:
       | I was curious how they would actually implement this, if it's
       | actually onion routing that's pretty cool.
       | 
       | I wonder what advantage this gives over using NextDNS?
        
         | peddling-brink wrote:
         | NextDNS is encrypted DNS. DNS is like using your neighbor
         | across the street for all your directions, except you have to
         | shout.
         | 
         | "YO, WHERE'S THE GROCERY STORE AGAIN? ALSO AFTER THAT I'M
         | VISITING THE STRIP CLUB, AGAIN."
         | 
         | NextDNS turns that shout into a signal/telegram message, to a
         | different neighbor. There's still a neighbor involved, but at
         | least the neighborhood doesn't get to hear anymore.
         | 
         | If they include DNS in the onion routing scheme, it turns into
         | a game of telephone, where the neighbor doesn't know you
         | anymore.
         | 
         | Your traffic, and directions become more private.
        
       | xnx wrote:
       | This is great. I hope this spurs Google to make their VPN
       | (https://one.google.com/about/vpn) more widely available. A few
       | audiences they could expand it to: any ChromeOS device, any Pixel
       | phone, any Android phone, any mobile Chrome user, any Chrome
       | user.
        
         | crossroadsguy wrote:
         | They'll release that as a Chrome app.
        
         | irae wrote:
         | A lot of people think of VPN as escaping Google mega-giga-
         | tracking schemes. So growing their own would be doomed to fail.
        
         | unknown_error wrote:
         | Because Google is definitely the most trustworthy company when
         | it comes to data governance and respecting user privacy. No
         | chance they'd use it to put you into a FLoC-type thing,
         | benefiting their own advertising business while shutting out
         | competitors.
         | 
         | Google, the engineering company, always plays second fiddle to
         | Google, the advertising company.
        
           | xnx wrote:
           | I trust Google and Apple 100x more (low estimate) than I do
           | Comcast/Verizon, AT&T, etc.
        
             | foobiekr wrote:
             | I agree on the Apple, but not on Google. AT&T, Comcast,
             | Verizon, Deutschetelekom, British Telecom, NTT, etc. Have
             | spent the last 15 to 20 years being absolutely deskilled by
             | people leaving for better jobs in the hyperscalers. If
             | you're worried about any telecom carrier looking at your
             | traffic then all you need to do is make sure that encrypted
             | client hello and DNS over HTTPS are used by the devices
             | that you have. The products that they use to do deep packet
             | inspection are all falling apart at this point and since
             | they have no internal technologist they are busy asking
             | vendors to fix it for them, and the vendors can't fix it
             | either.
             | 
             | Worrying about the carriers was really hot for a while
             | especially post Snowden, but it's really not a genuine
             | threat.
        
             | unknown_error wrote:
             | True.
        
             | dmitriid wrote:
             | Meanwhile even Google's employees don't know what data
             | Google collects, how to turn it off, and de-google their
             | phones. A thread with unsealed documents:
             | https://twitter.com/jason_kint/status/1398353211220807682
        
             | LegitShady wrote:
             | I don't trust google and apple equally. I trust google
             | about the same level as comcast/etc.
             | 
             | apple having less advertising influence is more
             | trustworthy, I think, in terms of privacy. don't lump
             | google in with them.
             | 
             | Meanwhile apple has many many anti consumer anti
             | competitive policies so while I may trust my privacy with
             | them more, I wouldn't trust them to fight for my privacy
             | rights in the long run.
        
           | smoldesu wrote:
           | To be fair, Apple's software has always played second fiddle
           | to their hardware. I trust Apple with a VPN about as much as
           | I do Google.
        
             | unknown_error wrote:
             | They don't have an inherent conflict of interest the way
             | Google does (advertising vs privacy in the same company).
             | The App Store makes them plenty of money, and if anything,
             | enhancing user "privacy" by limiting access of other adtech
             | vendors only strengthens their walled garden and increases
             | revenue. Even something like Fortnite or the Epic store...
             | as long as they can dictate their entire stack from
             | hardware to software (very much unlike Google + OEMs +
             | third-party stores), they'll have a huge advantage over
             | Google in terms of being able to limit your personal info
             | being used by third parties, while still retaining it for
             | their own use.
        
       | nuker wrote:
       | I hope it'll not bring captcha hell, as Google does for using
       | VPNs. Twitter is simply blocking my VPN provider. eBay sends
       | scary email every time I login.
        
         | acdha wrote:
         | This will come down to reputation. VPN providers which don't do
         | a good job managing abuse from their networks get blocked a lot
         | more readily than better run networks, and in this case they'd
         | be able to make pretty strong assurances that they can link
         | activity to a single user.
        
         | xnx wrote:
         | Because Apple is so large and well respected, issues will be
         | blamed on whoever is putting up the captcha, not Apple.
        
         | NorwegianDude wrote:
         | You can disable the captcha by paying the site a 30 % cut of
         | the purchase price of the Apple device and the subscription./s
        
       | jameshart wrote:
       | Interesting. I thought I recalled talking about this on HN
       | previously:
       | 
       | https://news.ycombinator.com/item?id=10355868
       | _-__--- on Oct 8, 2015 | parent | favorite | on: Verizon revives
       | "zombie cookie" device tracking on...              Tor as an OS-
       | level feature may not spark the best reaction. It's been given a
       | bad name ("deep web," silk road, etc) in mass media and many
       | people don't understand it enough to think of it as anything
       | other than bad.         I think that it'd be cool to have, but I
       | don't think that Apple would ever implement it.
       | jameshart on Oct 8, 2015 [-]                  Agree, it's
       | phenomenally unlikely, but then again there is a part of me which
       | could actually imagine Apple doing something like it. They
       | wouldn't use Tor, of course, they'd build a proprietary
       | equivalent, and then come out on a black stage to 'introduce
       | Apple Undercover, a revolutionary enhancement to personal network
       | privacy and security'.
        
         | Legion wrote:
         | I love the moments when you can point back to an old post and
         | say, "called that!"
         | 
         | (No snark, I really do love it.)
         | 
         | Enjoy the moment, future seer.
        
           | amznthrwaway wrote:
           | I mean, he also said it was phenomenally unlikely.... Maybe
           | 1/2 a point.
        
         | headmelted wrote:
         | Your prediction of it being called Apple Undercover is
         | _significantly_ more 80's though. And I like it.
         | 
         | So much so that I would accept Apple using something other than
         | Helvetica this one time for a Miami Vice typeface and a Michael
         | Knight and Kitt intro at WWDC.
         | 
         | I cannot stress enough that Hasselhoff needs to stay in
         | character the entire time or the whole concept doesn't work.
        
           | mkr-hn wrote:
           | Hasselhoff drifts on to stage in KITT, jumps out, and tackles
           | Tim Cook. They then get up, shake, laugh, and take turns
           | explaining how iCloud+ VPN makes it look like everything you
           | do online comes from Apple.
        
             | headmelted wrote:
             | He may sing in German as the musical guest they sometimes
             | have at the end of the keynotes, but that's as much
             | flexibility as I'm willing to allow.
        
               | mkr-hn wrote:
               | Can William Daniels at least voice the car saying "one
               | more thing" before throwing it to Hasselhoff?
        
               | MobileVet wrote:
               | The Hoff MUST sing 'Jump in my car' for this to really
               | land.
               | 
               | https://youtu.be/dm7jEA3frY4
        
           | tobr wrote:
           | > I would accept Apple using something other than Helvetica
           | 
           | At this point, Helvetica itself would give a retro feeling if
           | used by Apple. They've been all in on San Francisco for
           | several years.
        
             | watersb wrote:
             | Nobody goes there anymore. It's too crowded.
             | 
             | https://imgur.com/gallery/2eBXYnT
        
         | mikeiz404 wrote:
         | No offense or anything but what's the point of making this
         | comment outside of showing that you were right? Good
         | prediction.
        
           | jameshart wrote:
           | (Fair question. I just found it amusing. I'm annoyed it got
           | voted to the top. For substantive discussion, people should
           | look down page)
        
         | shoto_io wrote:
         | Hey there, can I call you? I have some questions about the
         | future!
        
         | toxik wrote:
         | An even more impressive prediction in 2015, a time when Apple
         | was not positioned as some type of savior of user privacy.
        
           | jameshart wrote:
           | I'm not so sure. If you read back up that thread, the thought
           | that triggered it was from qzervaas:                  Apple's
           | already shown they don't like this behaviour with their
           | randomised MAC addresses in iOS 8+.
           | 
           | And elsewhere in the thread people called out the fact apple
           | had already introduced support for ad blocking. So Apple's
           | privacy-positive posture was already in the air.
           | 
           | I think there is a sense in which privacy was already a
           | differentiator for Apple in iOS (as contrasted with Google's
           | motives in android in particular of course) - so this did
           | feel like a not completely implausible way they could go to
           | double down on that differentiator.
        
             | simonh wrote:
             | Steve Jobs talking about this at D8 in 2010, and of course
             | the privacy features he talks about were baked into the OS
             | APIs from the start.
             | 
             | Apple's rift with Google over user data collection in
             | Google Maps goes back to 2009 when Google held Apple to
             | ransom for the user data in return for turn-by-turn
             | directions. Apple refused and started building their own
             | maps service, buying Placebase in July that year.
             | 
             | https://www.youtube.com/watch?v=39iKLwlUqBo
        
               | shaicoleman wrote:
               | If anyone's interested in reading more, here's an article
               | which discusses why Apple switched from Google Maps:
               | 
               | http://allthingsd.com/20120926/apple-google-maps-talks-
               | crash...
        
           | hlau wrote:
           | I actually wrote a deep dive on Apple's pivot to privacy.
           | https://saturation.substack.com/p/apple-facebook-and-the-
           | glo...
        
           | tialaramex wrote:
           | It's really not about privacy though, the insight needed (not
           | that I'm saying it was easy to make this particular
           | prediction) is that Apple is all about the Walled Garden. It
           | can't be Tor because Apple doesn't own Tor, and so that's not
           | inside the Walled Garden, whereas "Apple Undercover" even if
           | it were functionally no better or worse than Tor, is
           | magically blessed by the Apple branding. And Apple have been
           | all about Walled Gardens for decades.
        
             | yarcob wrote:
             | Tor has reputation problems. Lots of services block tor
             | exit nodes because of all the abuse that comes from them.
             | 
             | By making it a feature for paying subscribers only, Apple
             | probably hopes that their solution won't be interesting for
             | criminals. (Apple will likely cooperate with law
             | enforcement)
        
           | [deleted]
        
             | [deleted]
        
         | nabla9 wrote:
         | Apple is in crossfire:
         | 
         | (a) There is pressure from many governments to give backdoor
         | for surveillance. Or just comply with subpoenas that are
         | against human rights.
         | 
         | (b) Complying with local laws generates PR damage. It makes
         | privacy and ethics as a brand strategy look disingenuous.
         | 
         | The solution is, of course, to generate truly secure system
         | where Apple can't make backdoors. Those services may not be
         | available in some countries, but then it's just missing
         | service, not a compromised system.
        
           | gjsman-1000 wrote:
           | This is something Apple is increasingly working on. For
           | example, in Fall 2020 they actually revised their CPU designs
           | (including older CPUs) with a new Secure Enclave design that
           | uses mailboxes to more securely store the number
           | authentication attempts inside the secure enclave.
           | 
           | The goal of this is to make it so that even if the FBI had an
           | incident similar to 2016, Apple would not be able to fulfill
           | their request to make a backdoor, and the FBI wouldn't be
           | able to make a backdoor even if they had the power to sign
           | and run any code they wanted on the phone.
           | 
           | That's how you make a secure system these days. You can't
           | just make it secure to everyone but yourself and fight the
           | government - you need to secure it from yourself as well.
        
             | shard wrote:
             | That only works if you don't give control of the servers
             | over to a third party and also use encryption on the
             | servers. Which Apple has not been able to do across the
             | board.
        
         | matt-attack wrote:
         | Wow props for quite a prediction. You definitely deserve some
         | recognition for that one.
        
       | gordon_freeman wrote:
       | Does anybody know, how iCloud+ VPN would compare with Cloudflare
       | WARP in terms of better privacy protection.
        
         | dustyharddrive wrote:
         | Don't forget that neither is a pure VPN, though that's not
         | always a bad thing -- Private Relay is better than a VPN
         | because onion routing means "no one party"[1] can correlate
         | your connections and identity.
         | 
         | However WARP, being more like a VPN, requires you to trust
         | Cloudflare to not log DNS lookups / the servers you connect to
         | and associate that with your origin IP.
         | 
         | Why do I hesitate to call WARP a real VPN? It reveals your
         | actual IP address to websites you visit via X-Forwarded-For.
         | [2]
         | 
         | Also I think the fact that iCloud Private Relay will be built-
         | in makes it more private than WARP -- more users' traffic will
         | come out of each node.
         | 
         | [1]: Obviously this is imperfect because the Apple (which knows
         | your IP) and third-party (which knows the network traffic)
         | nodes will likely be in the same jurisdiction as each other,
         | subject to the same laws, as mentioned by other commenters.
         | 
         | [2]: https://twitter.com/eastdakota/status/1176987146177196032
         | 
         | edit: typo, line break, clarified Private Relay concept
        
       | GoofballJones wrote:
       | I liked this little article as it reminds me of when the Web was
       | still young and mainly just text with no formatting or graphics
       | yet. Takes me right back to 1991!
        
       | [deleted]
        
       | defaultname wrote:
       | https://developer.apple.com/videos/play/wwdc2021/10096/
       | 
       | A pretty decent overview of the scope of the product.
       | 
       | As mentioned in the video, the service also is involved if your
       | app does HTTP over port 80, offering at least some marginal level
       | of improvement. Otherwise it leaves your app traffic as is.
       | 
       | As to Mail, the linked comment mentions that but I don't remember
       | it being a part of the solution (nor does it seem feasible that
       | it could be). Apple offers privacy improvements in mail, but not
       | via the private relay.
        
         | floatingatoll wrote:
         | https://developer.apple.com/wwdc21/10085
         | 
         | Privacy Relay is also discussed in the privacy pillars video
         | for a few minutes, starting at 24m30s.
        
         | Jyaif wrote:
         | To be exact, the video says that it includes all insecure HTTP
         | traffic, so if you use HTTPS for now you are saved.
        
       | neximo64 wrote:
       | It just re routes traffic to your nearest Fastly pop and mixes
       | traffic up with everyone else nearby.
        
         | judge2020 wrote:
         | It specifically goes through an Apple proxy first and fastly
         | (or other partners like Akamai and Cloudflare) don't see the
         | incoming IP address.
        
       | theonlybutlet wrote:
       | I'm curious how does the second hop work? are the third parties
       | contracted by Apple to provide the service? What's in it for
       | them?
        
       | res0nat0r wrote:
       | Is this like Cloudflare Warp then?
       | 
       | https://1.1.1.1/
        
         | alpb wrote:
         | the beta seems to be using Warp actually.
        
       | pilif wrote:
       | My experience with this so far was... mixed.
       | 
       | - This breaks DNS resolution for company-internal domains.
       | 
       | - This routes all my traffic through CloudFlare or another CDN I
       | might or might not trust (yes, the IP is hidden, but not the
       | data)
       | 
       | - it significantly slows down my internet access on my location.
       | 
       | - it tends to turn itself on again without my intervention
       | 
       | especially the last point is very problematic for me
        
         | defaultname wrote:
         | To use it you're clearly using early beta software. Clearly it
         | isn't going to "turn itself on again".
         | 
         | I turned it on and actually forgot I did. Performance is decent
         | here. I mean _of course_ it 's going to be worse than native,
         | but that's the compromise.
         | 
         | As to trusting Cloudflare -- what do you mean? You understand
         | your connection is still TLS end-to-end encrypted (presuming
         | that's what we're talking about), right? I mean...presuming the
         | site your talking to isn't using Cloudflare SSL. In no way does
         | this reduce that security. If you're talking about HTTP, well
         | everyone in between can already see that.
        
           | kerng wrote:
           | [Clearly not turn itself on.]
           | 
           | Funny story, I was shocked and quite annoyed that an iPhone
           | automatically turns on Wifi and stuff every day by itself -
           | even if you turn it off...
           | 
           | Still dont know how to actually turn it off
        
             | mvanbaak wrote:
             | If you disable it from the control center thingie overlay
             | it even states that is only for this day ...
             | 
             | If you disable it from settings, it stays off.
        
             | klaushardt wrote:
             | If you tap the wifi button in your controll center it just
             | turns it off for 24 hours or when you switch locations. If
             | you turn it off in the Settings App then it stays off.
        
             | permo-w wrote:
             | if you disable from quick menu, it turns back on. if you
             | disable from settings, it doesn't
        
               | nucleardog wrote:
               | And when you do so it does flash a message along the
               | lines of "Disconnecting nearby wifi until tomorrow".
               | 
               | Which makes it pretty clear it's not a wifi kill switch
               | but just a "my current connection is shit, let me use
               | cellular" button.
        
           | marmaduke wrote:
           | > Clearly it isn't going to "turn itself on again"
           | 
           | Why is it so clear? An iPhone hotspot turns itself off as
           | soon as a device disconnects, with no option to leave it on,
           | presumably for security or battery reasons.
        
         | gjsman-1000 wrote:
         | It directs to an Apple server, then CloudFlare, so considering
         | it's basically a double VPN speed decreases have been
         | reasonable.
         | 
         | The fact they can see unencrypted HTTP data is a downside with
         | all VPNs. At least you have the double hop going in your favor.
         | 
         | As for turning on by itself, it's annoying, but it is the very
         | first developer-only preview so I'm not complaining yet.
        
         | yunohn wrote:
         | > This breaks DNS resolution for company-internal domains.
         | 
         | Is this not the case for any VPN or proxying service? In fact,
         | it could even be a security flaw if your internal domains were
         | accessible on external VPN style endpoints?
        
           | gjsman-1000 wrote:
           | Also it's developer preview 1. People like the OP who gripe
           | about bugs on such an unfinished product are the reason why
           | Apple doesn't make those first builds available to anyone but
           | their registered developers for the first month.
        
           | krageon wrote:
           | > Is this not the case for any VPN or proxying service?
           | 
           | No, it's not.
           | 
           | > In fact, it could even be a security flaw if your internal
           | domains were accessible on external VPN style endpoints?
           | 
           | It would be, but then this is not something that happens on a
           | network configured in the way you describe.
        
             | krferriter wrote:
             | It is for any VPN client that routes DNS traffic through
             | the VPN as well as HTTP and other web traffic. It's not out
             | of the ordinary for this to happen.
        
             | yunohn wrote:
             | I use NordVPN. It specifically has an opt-in setting to use
             | locally discovered DNS in favor of their in-network DNS.
             | This is crucial since out-of-network DNS can leak activity.
             | 
             | I'm not sure what kind of network you believe I described,
             | but would be useful to have a clearer explanation from you.
        
             | defaultname wrote:
             | "No, it's not"
             | 
             | The root's observation is that it doesn't use the machine
             | configured DNS. The overwhelming majority of VPNs also
             | don't use the machine configured DNS. Maybe not "any", but
             | if you're using a VPN you're generally going to want your
             | DNS going over it as well.
             | 
             | But it is worth noting if you're on a corporate network, or
             | if you use a DNS solution like NextDNS -- when you turn on
             | PR those no longer play a part, at least to Safari traffic.
        
         | williamtwild wrote:
         | "yes, the IP is hidden, but not the data"
         | 
         | Using TLS it certainly should be.
        
           | stock_toaster wrote:
           | Does it work like an https proxy (with CONNECT) or a socks
           | proxy?
           | 
           | Because if it is instead actually unwrapping the connection
           | somehow (eg. mitm) then they would be able to see the
           | content, and that seems like a huge no-go -- both for the
           | users, AND for apple as I would think it would open them up
           | to liability.
           | 
           | note: they certainly would be able to see unencrypted http
           | traffic regardless though.
        
         | EveYoung wrote:
         | Does Apple preserve the client source IP in the request
         | (similar to Cloudflare's VPN) or will the server only see the
         | IP of the exit node?
        
           | dividuum wrote:
           | The whole point of the service is to hide the client source
           | IP.
        
             | EveYoung wrote:
             | Not necessarily. I thought it was mainly about encrypting
             | traffic in untrusted networks. Cloudflare already does it
             | like this in their VPN service.
        
               | dividuum wrote:
               | Correct. I guess it wasn't really obvious from the linked
               | mail. The introduction video at
               | https://developer.apple.com/videos/play/wwdc2021/10096/
               | is a lot clearer.
        
               | defaultname wrote:
               | Not sure why you said correct, as it's both. A big part
               | of private relay -- I would say the most significant part
               | -- is to allow people to talk to websites without giving
               | up their personal IP (and from that pretty tight
               | geolocation, and with fingerprinting a correlation with
               | loads of other data they collect). Apple makes a big deal
               | about it being about maintaining privacy, not just
               | against snooping of traffic -- which is unlikely -- but
               | against fingerprinting and targeting from the services
               | and sites you connect to.
               | 
               | And to answer the original guy, no Apple does not add any
               | headers or details to tell the destination what your IP
               | address is. They just see that they're talking to an exit
               | node somewhere approximal of your general region.
        
         | wolverine876 wrote:
         | > the IP is hidden, but not the data
         | 
         | Isn't the great majority of your traffic HTTPS?
        
         | xiphias2 wrote:
         | > This breaks DNS resolution for company-internal domains.
         | 
         | Why would it? The WWDC developer video clearly states that it's
         | only for public domains.
        
           | ec109685 wrote:
           | I believe the DNS requests are routed through their ingress
           | proxy, so there's no chance to hit an internal split horizon
           | DNS server.
        
       ___________________________________________________________________
       (page generated 2021-06-16 23:00 UTC)