No, Apple’s Private Relay is not a VPN – CNET

Apple touted its privacy work at its online WWDC event for developers.

Apple touted its privacy work at its online WWDC event for developers.

Apple; screenshot by Stephen Shankland/CNET

This story is part of Apple Event, our full coverage of the latest news from Apple headquarters.

When Apple announced a trio of new privacy perks for its iCloud Plus subscription service Monday at Apple’s WWDC event, the headliner was Private Relay — a browser-based encryption boost, aimed at the growing number of people who are turning to virtual private networks for better online privacy. 

Although Apple executives have begun positioning the new Safari encryption service as a trustworthy alternative to commercial VPNs, Private Relay is not, strictly speaking, a VPN. We’re still waiting on details on how the service works, but confusing it for a VPN may prove dangerous to those who rely on them for personal safety, and ineffective for those seeking ways around government censorship. 

On the other hand, Private Relay can be used alongside a traditional VPN, whether that’s a personal or company VPN. According to Apple developers, that currently means Private Relay will ignore the traffic of your VPN. The tech behind Private Relay, however, could theoretically represent a significant leap forward for overall privacy among commercial (though not enterprise) VPN users as additional research emerges on its potential to prevent a shady VPN provider from identifying you

Read more: Apple privacy updates tell you more about how apps use your data

With an underlying technology that centers on encryption, it’s unlikely Private Relay will be offered in countries where it may interfere with domestic surveillance or contradict anti-encryption laws. Apple confirmed Private Relay won’t be available in China, one of its most important markets. Private Relay will also be unavailable in Belarus, Colombia, Egypt, Kazakhstan, Saudi Arabia, South Africa, Turkmenistan, Uganda and the Philippines. 

Apple said it will offer Private Relay only in accordance with local laws but that other announced iCloud Plus privacy features, like Hide My Email, may be available in restricted areas as local laws permit. 

For the average US user, however, Private Relay’s addition to Safari represents a potentially groundbreaking shift in how browsers can be fundamentally reshaped to better protect you from aggressive tracking by advertisers. More than raising the bar on browser privacy, however, a curious piece of underlying tech in Private Relay is poised to open a new chapter in the browser wars. 

Apple Private Relay vs. a standard VPN

VPN Private Relay
Your public IP (where you are and who you are) is encrypted, start to finish Yes Yes*
Assigns you a new IP when you connect Yes Yes
All outgoing data from your device is encrypted via the app Yes No
You can overcome geo-location blocks and censorship to access media Yes No
Your traffic blends in with everyone else’s via VPN obfuscation Yes No

*Private Relay’s browser-based IP address encryption benefits are limited to Safari

How Private Relay is different than a VPN

No device-wide encryption via the app: While many VPNs offer a secondary, browser-only plugin, a true standalone VPN is designed to encrypt all of the information coming out of your device through its app. It will then assign you a new IP address, and connect you to one of its network of servers before spitting you out at your destination website. In Apple’s case, however, only some of your device’s traffic is specifically handled by Private Relay for encryption. In its developer-focused presentation, Apple said Private Relay encryption only covers Safari, the DNS-related traffic on your device, and a small subset of traffic from apps. Developers said any connections your app makes over the local network or to private domain names will be unaffected, and that any traffic that comes from using a proxy will also be exempt. In other words, if you use the Chrome browser from your iPhone, don’t expect any Private Relay protections or features.  

No geo-blocking: A key feature of a VPN is the ability to overcome geographic restrictions and access global content on an open web. Some use that feature to access streaming media services while abroad and watch their home country’s entertainment catalog. But for those in countries burdened by censorship and oppressive regimes, VPNs offer the ability to circumvent geo-restrictions to safely access crucial information and news. Private Relay is explicitly designed to comply with geo-blocking and does not hide your general region or city from internet providers or authorities. 

No web traffic obfuscation: Encrypted web traffic created by using a VPN looks a lot different than non-VPN traffic, but the best VPNs camouflage themselves to appear like normal traffic in a process called obfuscation or, as it sometimes specified, VPN obfuscation. The ability to overcome geo-blocking and escape organizational networks relies on more than appearing to be from a different location; it relies on your traffic looking inconspicuous. That’s where VPN obfuscation comes in. Although Apple at times uses the term obfuscation in a non-technical sense to describe how their traffic may appear as normal traffic in some contexts, when you’re using Private Relay to connect to a business or school network, Private Relay’s proxy server traffic is readily identifiable and the service makes no effort to obfuscate itself with traditional VPN-type obfuscation. Accordingly, Apple developers have clearly offered instructions to business and school network managers on how to make allowances for this traffic, or how to isolate it for exclusion by blocking the hostname of the iCloud Private Relay proxy server.

Split-tunneling differences: A handy feature found among most leading VPNs, split-tunneling is an option that allows you to forgo device-wide encryption, in favor of encrypting only one or more apps on your device. Thus, you create two “tunnels” of internet traffic. This feature is helpful in several use-specific cases, like if you want to use a VPN to achieve faster torrenting speeds but you’d like to continue browsing normally. Private Relay has a similar feature that works differently. You can still use Private Relay even when you connect to your workplace’s private network, for instance. 

Multiple hop architecture: Many VPNs offer you the option of multi-hopping (or a “double hop”), which allows you to better cover your trail by connecting you to a series of servers, one after the next, before you land at a website. Private Relay offers what it calls “dual hop architecture,” which is different from VPN multi-hopping. When using Private Relay, the two “hops” you make first give you a new, semi-anonymous IP address, and then secondly decrypt the name of the website you’re requesting. 

Read more: Best iPhone VPN of 2021

What we know about Private Relay

Private Relay has two end goals. The first is to limit how much data advertising companies and ISPs can see about your browsing. The second goal is to ensure Apple can see only who you are and not what sites you’re visiting, while the third-party servers which get you to those sites can see where you’re going and your rough location but not who you are. 

Here’s how it’s done. Privacy Relay is built into both the forthcoming iOS and MacOS versions, but it will only work if you’re an iCloud Plus subscriber and you have it enabled from within your iCloud settings. 


Once it’s enabled and you open Safari to browse, Private Relay splits up two pieces of information that — when delivered to websites together as normal — could quickly identify you. Those are your IP address (who and exactly where you are) and your DNS request (the address of the website you want, in numeric form). 

Once the two pieces of information are split, Private Relay encrypts your DNS request and sends both the IP address and now-encrypted DNS request to an Apple proxy server. This is the first of two stops your traffic will make before you see a website. At this point, Apple has already handed over the encryption keys to the third party running the second of the two stops, so Apple can’t see what website you’re trying to access with your encrypted DNS request. All Apple can see is your IP address. 

Although it has received both your IP address and encrypted DNS request, Apple’s server doesn’t send your original IP address to the second stop. Instead, it gives you an anonymous IP address that is approximately associated with your general region or city. 

That approximate location can mean different things in different places, however.

“It’s obviously very different technology but in general with approximate location on the iPhone, the size of the area can change depending on the place in the world you are and population density and things like this,” an Apple spokesperson told CNET.

Using San Francisco as a hypothetical example, the size of that approximate location could narrow. 

“With the approximate location, I could be anywhere in the peninsula of San Francisco. So you could think that I’m up at the northern end of San Francisco near Ghirardelli Square or the app could be getting information that I’m down near Cesar Chavez [Street]. It still gets a precise location. It’s just that my precise location bounces around within that general area in such a way that no one knows where I actually am,” the spokesperson said. 

Once it has assigned the new IP address, the Apple proxy server sends the encrypted DNS request and that new IP address to the next stop. That second stop is another proxy server, one not run by Apple but by a currently unknown third-party company that’s ready to decrypt your DNS request. 


Finally, that third-party proxy server decrypts your DNS request and sends it to your destination website along with your general location. While the destination website can’t pinpoint your exact location because it doesn’t have your true IP address, it can still see what region your device is in. 

The tech behind the curtain 

With the second proxy server’s ability to see what websites you’re requesting and your general city, the pressing question quickly becomes who’s running that third-party server, a question Apple has so far declined to answer. 

Within hours of Private Relay being announced, however, it became evident that Cloudflare is at least one of Apple’s partners in powering Private Relay when app researcher Jane Manchun Wong took to Twitter to confirm she’d been issued an IP address belonging to Cloudflare while using the currently available developer version of Private Relay. Wong’s tweet was followed by a wave of other users noting the same results, drawing comparisons between Private Relay and proxy app Cloudflare Warp.  

Cloudflare was a primary partner in Apple’s push to standardize the potentially game-changing element of Private Relay —  its in-browser use of something called Oblivious DNS-over-HTTPS (ODoH).

What’s the big deal with ODoH? It’s poised to answer a major problem that has puzzled privacy advocates since 2018 when — in a previous browser-encryption collaboration with Cloudflare — Mozilla pioneered a way to route internet traffic called DNS over HTTPS (DOH) from within a browser. A testament to its anti-surveillance effectiveness, the new method earned Mozilla the laughable award of “Internet Villain of the year” by a UK ISP lobby in 2019 — meaning, essentially, the privacy technology had the potential to break the ISPs’ business models that revolve around sucking up, bundling and selling as much of your usage data as possible. 

Though hailed as a breakthrough for privacy, the new method wasn’t without its flaws. 

When Mozilla enabled DOH for US Firefox users in early 2020, CNET’s Stephen Shankland dug into those flaws. The most pressing of which are that DOH could centralize DNS activity and that it could offer companies a new way to track you online. Among DOH’s critiques, perhaps the most prescient quote came from Bert Hubert, creator of the PowerDNS software

“I find it highly disappointing that Mozilla decided, on behalf of all users it deems American, that this was a good idea,” Hubert said in an email. “While encrypted DNS is great, it matters a great deal who you encrypt your DNS to… They did not perform surveys, for example, on how people would feel about giving a trace of all their internet activities to Cloudflare.”

Read more: Cloudbleed bug: Everything you need to know

Theoretically, ODoH would reduce the amount of identifiable information Cloudflare would obtain about a user, compared to that which they’d see with DOH. Cloudflare hasn’t been free of security concerns, however. In 2017, a flaw dubbed Cloudbleed afflicted websites using Cloudflare’s products. Cloudflare fixed the problem, but the exposure included usernames, passwords, messages and other potentially identifying information. 

Criticism of the ODoH protocol came in January of this year, when digital privacy advocates at the Electronic Frontier Foundation cautioned that the protocol could ultimately facilitate more censorship than it overcomes. 

“One possibility worries us: Using ODoH gives software developers an easy way to comply with the demands of a censorship regime in order to distribute their software without telling the regime the identity of users they’re censoring,” EFF said. 

In other words, by choosing a reputable ODoH proxy that refuses to resolve censored websites, software companies could make headway into distributing software in heavily censored countries like China and Saudi Arabia so long as that censorship was baked in, such as by distributing a censored version of the software.

“This would remove any potential culpability that software developers have for revealing the identity of a user to a government that can put them in danger, but it also facilitates the act of censorship. In traditional DoH, this is not possible. Giving developers an easy-out by facilitating ‘anonymous’ censorship is a worrying prospect,” EFF said.  

Cloudflare didn’t return CNET’s request for comment. 


Aside from Apple’s reluctance to name their proxy partners, another roadblock for Private Relay users may be their own individual school or business networks. Most leading VPNs take measures to camouflage themselves and blend in with non-VPN traffic, but proxy servers are readily identified and blocked by most private networks. That means it’s going to be up to individual campuses and companies to allow proxy traffic from Apple devices. Otherwise, Apple said, you won’t be able to use the service. 

For right now, more is unknown than known about Private Relay. We expect more specifics and documentation to emerge about the gears of Private Relay as the full launch of iOS 15 and new MacOS/iPad OS approaches in the fall. Since a slow leak of discrete partnerships is par for course with Apple — at least as far back as its Maps-TomTom collaboration — we also expect more information to emerge about the nature and scope of its partnerships with third-party intermediaries.

Until then, Apple’s choice to blind themselves to user DNS requests with Private Relay could allow the company to put some distance between itself and the contentious debate over encryption more generally that it has recently been mired in. What remains to be seen is whether the tech giant’s use of the new ODoH protocol will push other browsers to adopt their own versions of it in lieu of the more widespread DOH. 

But even if Private Relay falls short of being a full-fledged VPN, Apple may well view it as a win-win: it gets to wrap itself in the privacy flag (a continuing differentiation upsell to users versus Google and Facebook), even as it collects less and less user data by default — potentially obviating subpoenas when government agencies come calling

Update, June 16: Adds clarifying language distinguishing app-routed from default device encryption, VPN-specific obfuscation from other obfuscation types, and specifies browser-based IP address encryption benefit requirements.

Source of this news:

Related posts:

Chinese APT Rebrands to Target Transportation Sector -
Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service Group Now Called Earth Centaur Tries to Access Flight Schedules Mihir Bagwe • December 20, 2021     The Chines...
iCloud+ Private Relay: How to Prepare it on Mac - Mechanic Times
(Photo: Unsplash/ Christian Wiediger) Mac technique iCloud+ Private Relay is a offer that Apple added relating to its iPhone and sheltered with iOS, as well as by way of iPadOS 15. With th...
Form DEF 14A Enact Holdings, Inc. For: May 12 -
Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here. SCHEDULE 14AProxy Statement Pursuant to Section 14(a) of the Securities Exchange Act of 1934 (Amendment No...
Guys: What we do... - The Perform Online
“I was exposed to cybersecurity back when I was in Overall look One. My father was a co-owner of a cybercafé in my hometown, Temerloh, Pahang, and this is where it all started. Numerous, Internet...
What is a VPN and why do you need one? Everything you need to know -
Whether you work from a traditional office, home office, your iPhone, or on the road, a VPN is one of the best ways to protect yourself from data breaches on the internet, especially when using publ...
How to Rotate the Screen on Windows 10 - Windows Report
by Andrew Wafer Author Andrew is not just trying to bring you closer to Windows, but he's truly interested in this platform. He just happens to be passionate about sharing that knowledge...
Install Code-Server for VS code on Ubuntu 22.04 or 20.04 LTS - H2S Media
Code Server is an open-source project to program on VS Code but using a web browser. Here we learn the command to install Code Server on Ubuntu 22.04 Jammy JellyFish or 20.04 Focal Fossa. VS Code...
Surfshark adds new cutting-edge technology to its VPN service - TechRadar
Audio player loading… Surfshark has announced it is adding new Nexus software defined network (SDN) technology to its consumer-faced VPN product.SDN is prevalent in enterprises and businesses whe...
Working with HTTP/2 in Burp Suite - The Daily Swig
PROFESSIONALCOMMUNITY Many servers now support HTTP/2. This exposes them to potential vulnerabilities that are impossible to test for using tools that only speak HTTP/1. Burp Suite provides unrivale...
Product showcase: Enclave - using zero trust network access to simplify your networks - Help Net Sec...
A huge number of Internet-accessible systems are protected by the principle of connect, then authenticate. This includes VPNs, web applications, databases, Windows Servers with RDP endpoints exposed,...
Using Microsoft's YARP project to proxy web-based microservices - OmniChannel Media
Inner source is the idea of using open source techniques to develop internal tools, using platforms such as GitHub for collaboration. Engineers across a company identify common issues and technologi...
KrebsOnSecurity Hit By Huge Very new IoT Botnet “Meris” , Krebs on Security instruction Krebs on Sec...
On Saturday evening, KrebsOnSecurity was the person of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. The breach came from “ Meris , ” the same newer botnet be...
Contemporary Controls Showcases New and Enhanced Building and Industrial Automation Products at AHR ...
Contemporary Controls Showcases New and Enhanced Building and Industrial Automation Products at AHR 2022 Contemporary Controls is looking forward to the return of the AHR Expo in Las Vegas. Be sure t...
TrickBot Spruces Up Its Banking Trojan malware Module - Threatpost
The conductor of your personal data may possibly be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the dealing of personal data can be found in any policy . In ad...
Roblox Teleport Failed Error Codes 769, 770, 772, 773 on Windows PC - TWCN Tech News
If when you try to use the Roblox Teleport Function to teleport in Roblox the online game platform on your Windows 11 or Windows 10 computer, but you receive any of the following Error Codes 769, 770...
Trump Tweet On ‘Chinese Virus’ Sparked Rising Use Of Anti-Asian Hashtags, UCSF Study Discoveries - C...
SAN FRANCISCO (CBS SF) – A tweet before former President Donald Trump in the early days of the COVID-19 pandemic has been attributed to one precipitous rise in anti-Asian hashtags on the social m...
Trojan Shield: FBI punks crims with faux app—and international help - TechBeacon
Police forces around the world are arresting more suspects of organized crime. They’re unsealing evidence gathered over the past two to three years via a private-messaging app, Anom (styled ΛNØM).Age...
Finish off Self-Hosted Bitwarden for Raspberry Pi | by mister. smashy | CodeX | Nov, 2021 - In the m...
Self organizing a modern password manager with MFA, backups, DDNS, per certificate, and enhanced protection . Password managers are a wonderful idea. I’ve used a trustworthy ...

IP Rotating Proxy Onsale


First month free with coupon code FREE30