![T-Mobile begins blocking iPhone drinkers from enabling iCloud Own Relay in the US [U] - 9to5Mac 1 tmobile private relay ProxyEgg T-Mobile begins blocking iPhone drinkers from enabling iCloud Own Relay in the US [U] - 9to5Mac](https://i0.wp.com/9to5mac.com/wp-content/uploads/sites/6/2022/01/tmobile-private-relay.jpg?resize=1200%2C628&quality=82&strip=all&ssl=1)
Earlier today, a major report indicated that some European carriers were blocking the Private Relay feature introduced by Apple with iOS 15. This feature is designed to give users an additional layer of privacy by ensuring that no one can view the websites that they visit.
Now, in addition to some carriers in Europe, it appears that T-Mobile/Sprint in the United States is also blocking iCloud Private Relay access when connected to cellular data.
Update: In a statement to 9to5Mac, a T-Mobile spokesperson said:
Customers who chose plans and features with content filtering (e.g. parent controls) do not have access to the iCloud Private Relay to allow these services to work as designed. All other customers have no restrictions.
However, many of the users we’ve heard from, and tested ourselves, do not have any such content filtering enabled. We’ve followed up with T-Mobile for additional clarification, but have not yet heard back.
Apple says that Private Relay is a feature designed to give users another layer of privacy when browsing the web. The first relay is sent through a server maintained by Apple, and the second is a third-party operator. The feature was announced at WWDC last June and initially slated for inclusion in iOS 15.
Apple ultimately shipped the feature as a “public beta,” meaning that it is disabled by default in the newest iOS 15 and macOS Monterey releases. You can manually enable it by going to Settings on your iPhone, tapping your name at the top, choosing iCloud, and choosing “Private Relay.”
T-Mobile was among the carriers in Europe that signed an open letter expressing concern about the impact of Private Relay. The carriers wrote that the feature cuts off networks and servers from accessing “vital network data and metadata and could impact “operator’s ability to efficiently manage telecommunication networks.”
In the UK, carriers including T-Mobile, EE, and others have already started blocking Private Relay usage when connected to cellular data. 9to5Mac has also now confirmed that T-Mobile is extending this policy to the United States.
This means that T-Mobile and Sprint users in the United States can no longer use the privacy-preserving iCloud Private Relay feature when connected to cellular data. An error message in the Settings app explains:
Your cellular plan doesn’t support iCloud Private Relay. With Private Relay turned off, this network can monitor your internet activity, and your IP address is not hidden from known trackers or websites.
The change does not appear to be network-wide just yet, but rather it appears T-Mobile is in the process of rolling it out. This means that some users might still be able to use iCloud Private Relay when connected to their cellular network – at least for now. The situation could also could vary based on your location or plan.
Apple has yet to comment on this situation, but it is worrisome to see carriers like T-Mobile interfering with system-level iOS features. There’s likely not much that Apple can do here, but it underscores another limitation of Private Relay as a feature as well as the power that carriers hold.
Read more:
FTC: We use income earning auto affiliate links. More.
Check out 9to5Mac on YouTube info Apple news:
Source of this news: https://9to5mac.com/2022/01/10/t-mobile-block-icloud-private-relay/
Related posts:
Editor’s Note: This is a free edition of The Technical Indicator, a daily MarketWatch subscriber newsletter. To get this column each market day, click here. Technically speaking, the major U.S. bench...
I was told to post this here via a topic I posted previously. Logs are attached to that post as well as new logs posted here. Also note that the computer that I mentioned in my previous post that had...
By Chris ParkerNOTE: All stats are as of the morning of Apr. 22. The Ozarks produces a bevy of talented athletes across all sports, but no sport in the area consistently produces more Division I tale...
Authorities across Europe on Tuesday said they’d seized control over Emotet, a prolific malware strain and cybercrime-as-service operation. Investigators say the action could help quarantine more tha...
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.When digital identity is mentioned, most pe...
VPNs are becoming increasingly popular on today’s internet, but many people still don’t know what they do or how to use them. This guide will walk you through the basics of VPNs and some reasons why ...
A new business intelligence report released by JCMR with Global Private Cloud Server Market Report has abilities to raise as the most significant market worldwide as it has remained playin...
Tim CookSource: AppleApple unveiled new versions of its operating systems on Monday which showed that the company's focus on privacy has taken a new turn. It's not just a corporate ideal or a marketi...
Organizations that don't use end-to-end HTTP/2 are susceptible to attacks that redirect participants to malicious sites along with other threats, security researcher shows at Black Hat USA. B...
A new as-yet unpatched weakness in Apple's iCloud Private Relay feature could be circumvented to leak users' true IP addresses from iOS devices running the latest version of the operating syste...
With every new version of iOS, Apple makes an effort to provide new privacy and security-focused features to make the iPhone and iPad more secure, and iOS 15 is no exception. It is, in fact, a huge l...
Internet access is no longer an option; it has become a requirement for everyone. Internet connection has its own set of advantages for an organization, but it also allows the outside world to commu...
Within my latest piece discussing the merits of deflation, I briefly touched on how several leading economic indicators appear to be signally growth may have peaked for the time being. Whilst these b...
VPNs allow interconnection between devices and networks via an encrypted connection over the Internet. Secure transmission of sensitive data is ensured by the encrypted connection. Users ...
These days, it is fairly common for mature companies to implement Intrusion detection system (IDS), intrusion prevention systems (IPS), and security information and event management (SIEM) when they ...
By the early 1990s, IBM and Hewlett-Packard, as well as Canon, Hitachi, Ricoh, and other large makers of office equipment, had realized that customers expanding their networks with new copiers and o...
I were raised on British TV shows before former Minister Jonathan Moyo came and ruined ZBC with his local content additionally jingles push. We had regarding black and white Peacock TV that most ...
UAE is a business hub acknowledged for its sleek skyscrapers. At the moment, UAE’s new political environment is getting influenced because of new cybersecurity threats.As per gulf businesses, four ou...