No, Apple’s Private Relay is not a VPN, but you can still try it out with iOS 15

Apple touted its privacy work at its online WWDC event for developers.

Apple touted its privacy work at its online WWDC event earlier this year.


Apple/Screenshot by Stephen Shankland/CNET

This story is part of Apple Event, our full coverage of the latest news from Apple.

When Apple announced a trio of new privacy perks for its iCloud Plus subscription service in iOS 15 at Apple’s WWDC event in June, the headliner was Private Relay — a browser-based encryption boost, aimed at the growing number of people who are turning to virtual private networks for better online privacy. Now, with iOS 15’s arrival on Monday (here’s how to download iOS 15), a wider swath of Apple users will be able to test drive the proxy service for themselves. 

Although Apple executives have begun positioning the new Safari encryption service as a trustworthy alternative to commercial VPNs, Private Relay is not, strictly speaking, a VPN. We’re still waiting on the details of how the service works, but confusing it for a VPN may prove dangerous to those who rely on them for personal safety, and ineffective for those seeking ways around government censorship. 

On the other hand, Private Relay can be used alongside a traditional VPN, whether that’s a personal or company VPN. According to Apple developers, that currently means Private Relay will ignore the traffic of your VPN. The tech behind Private Relay, however, could theoretically represent a significant leap forward for overall privacy among commercial (though not enterprise) VPN users as additional research emerges on its potential to prevent a shady VPN provider from identifying you

Read more: Apple privacy updates tell you more about how apps use your data

With an underlying technology that centers on encryption, it’s unlikely Private Relay will be offered in countries where it may interfere with domestic surveillance or contradict anti-encryption laws. Apple confirmed Private Relay won’t be available in China, one of its most important markets. Private Relay will also be unavailable in Belarus, Colombia, Egypt, Kazakhstan, the Philippines, Saudi Arabia, South Africa, Turkmenistan and Uganda. 

Apple said it will offer Private Relay only in accordance with local laws but that other announced iCloud Plus privacy features, like Hide My Email, may be available in restricted areas as local laws permit. 

For the average US user, however, Private Relay’s addition to Safari represents a potentially groundbreaking shift in how browsers can be fundamentally reshaped to better protect you from aggressive tracking by advertisers. More than raising the bar on browser privacy, however, a curious piece of underlying tech in Private Relay is poised to open a new chapter in the browser wars. 

Read more: Change these browser settings ASAP to protect your privacy in Chrome, Firefox and more

Apple Private Relay vs. a standard VPN

VPN Private Relay
Your public IP (where you are and who you are) is encrypted, start to finish Yes Yes*
Assigns you a new IP when you connect Yes Yes
All outgoing data from your device is encrypted via the app Yes No
You can overcome geo-location blocks and censorship to access media Yes No
Your traffic blends in with everyone else’s via VPN obfuscation Yes No

*Private Relay’s browser-based IP address encryption benefits are limited to Safari

How Private Relay is different to a VPN

No device-wide encryption via the app: While many VPNs offer a secondary, browser-only plugin, a true standalone VPN is designed to encrypt all of the information coming out of your device through its app. It will then assign you a new IP address, and connect you to one of its network of servers before spitting you out at your destination website. In Apple’s case, however, only some of your device’s traffic is specifically handled by Private Relay for encryption. In its developer-focused presentation, Apple said Private Relay encryption only covers Safari, the DNS-related traffic on your device, and a small subset of traffic from apps. Developers said any connections your app makes over the local network or to private domain names will be unaffected, and that any traffic that comes from using a proxy will also be exempt. In other words, if you use the Chrome browser from your iPhone, don’t expect any Private Relay protections or features.

No geo-blocking: A key feature of a VPN is the ability to overcome geographic restrictions and access global content on an open web. Some use that feature to access streaming media services while abroad and watch their home country’s entertainment catalog. But for those in countries burdened by censorship and oppressive regimes, VPNs offer the ability to circumvent geo-restrictions to safely access crucial information and news. Private Relay is explicitly designed to comply with geo-blocking and does not hide your general region or city from internet providers or authorities. 

No web traffic obfuscation: Encrypted web traffic created by using a VPN looks a lot different than non-VPN traffic, but the best VPNs camouflage themselves to appear like normal traffic in a process called obfuscation or, as it sometimes specified, VPN obfuscation. The ability to overcome geo-blocking and escape organizational networks relies on more than appearing to be from a different location; it relies on your traffic looking inconspicuous. That’s where VPN obfuscation comes in. Although Apple at times uses the term obfuscation in a non-technical sense to describe how their traffic may appear as normal traffic in some contexts, when you’re using Private Relay to connect to a business or school network, Private Relay’s proxy server traffic is readily identifiable and the service makes no effort to obfuscate itself with traditional VPN-type obfuscation. Accordingly, Apple developers have clearly offered instructions to business and school network managers on how to make allowances for this traffic, or how to isolate it for exclusion by blocking the hostname of the iCloud Private Relay proxy server.

Split-tunneling differences: A handy feature found among most leading VPNs, split-tunneling is an option that allows you to forgo device-wide encryption, in favor of encrypting only one or more apps on your device. Thus, you create two “tunnels” of internet traffic. This feature is helpful in several use-specific cases, like if you want to use a VPN to achieve faster torrenting speeds but you’d like to continue browsing normally. Private Relay has a similar feature that works differently. You can still use Private Relay even when you connect to your workplace’s private network, for instance. 

Multiple hop architecture: Many VPNs offer you the option of multi-hopping (or a “double hop”), which allows you to better cover your trail by connecting you to a series of servers, one after the next, before you land at a website. Private Relay offers what it calls “dual hop architecture,” which is different from VPN multi-hopping. When using Private Relay, the two “hops” you make first give you a new, semi-anonymous IP address, and then secondly decrypt the name of the website you’re requesting. 

Read more: Best iPhone VPN of 2021

What we know about Private Relay

Private Relay has two end goals. The first is to limit how much data advertising companies and ISPs can see about your browsing. The second goal is to ensure Apple can see only who you are and not what sites you’re visiting, while the third-party servers which get you to those sites can see where you’re going and your rough location but not who you are. 

Here’s how it’s done. Privacy Relay is built into both the forthcoming iOS and MacOS versions, but it will only work if you’re an iCloud Plus subscriber and you have it enabled from within your iCloud settings. 

apple-developer-screenshot-private-relay-gui-enable.png

Apple

Once it’s enabled and you open Safari to browse, Private Relay splits up two pieces of information that — when delivered to websites together as normal — could quickly identify you. Those are your IP address (who and exactly where you are) and your DNS request (the address of the website you want, in numeric form). 

Once the two pieces of information are split, Private Relay encrypts your DNS request and sends both the IP address and now-encrypted DNS request to an Apple proxy server. This is the first of two stops your traffic will make before you see a website. At this point, Apple has already handed over the encryption keys to the third party running the second of the two stops, so Apple can’t see what website you’re trying to access with your encrypted DNS request. All Apple can see is your IP address. 

Although it has received both your IP address and encrypted DNS request, Apple’s server doesn’t send your original IP address to the second stop. Instead, it gives you an anonymous IP address that is approximately associated with your general region or city. 

That approximate location can mean different things in different places, however.

“It’s obviously very different technology but in general with approximate location on the iPhone, the size of the area can change depending on the place in the world you are and population density and things like this,” an Apple spokesperson told CNET.

Using San Francisco as a hypothetical example, the size of that approximate location could narrow. 

“With the approximate location, I could be anywhere in the peninsula of San Francisco. So you could think that I’m up at the northern end of San Francisco near Ghirardelli Square or the app could be getting information that I’m down near Cesar Chavez [Street]. It still gets a precise location. It’s just that my precise location bounces around within that general area in such a way that no one knows where I actually am,” the spokesperson said. 

Once it has assigned the new IP address, the Apple proxy server sends the encrypted DNS request and that new IP address to the next stop. That second stop is another proxy server, one not run by Apple but by a currently unknown third-party company that’s ready to decrypt your DNS request. 

apple-developer-screenshot-graphic-depicting-traffic-flow-separation.png

Apple

Finally, that third-party proxy server decrypts your DNS request and sends it to your destination website along with your general location. While the destination website can’t pinpoint your exact location because it doesn’t have your true IP address, it can still see what region your device is in. 

The tech behind the curtain 

With the second proxy server’s ability to see what websites you’re requesting and your general city, the pressing question quickly becomes who’s running that third-party server, a question Apple has so far declined to answer. 

Within hours of Private Relay being announced, however, it became evident that Cloudflare is at least one of Apple’s partners in powering Private Relay when app researcher Jane Manchun Wong took to Twitter to confirm she’d been issued an IP address belonging to Cloudflare while using the currently available developer version of Private Relay. Wong’s tweet was followed by a wave of other users noting the same results, drawing comparisons between Private Relay and proxy app Cloudflare Warp.

Cloudflare was a primary partner in Apple’s push to standardize the potentially game-changing element of Private Relay — its in-browser use of something called Oblivious DNS-over-HTTPS, or ODoH.

What’s the big deal with ODoH? It’s poised to answer a major problem that has puzzled privacy advocates since 2018 when — in a previous browser-encryption collaboration with Cloudflare — Mozilla pioneered a way to route internet traffic called DNS over HTTPS, or DoH, from within a browser. A testament to its anti-surveillance effectiveness, the new method earned Mozilla the laughable award of “Internet Villain of the year” by a UK ISP lobby in 2019 — meaning, essentially, the privacy technology had the potential to break the ISPs’ business models that revolve around sucking up, bundling and selling as much of your usage data as possible. 

Though hailed as a breakthrough for privacy, the new method wasn’t without its flaws. 

When Mozilla enabled DoH for US Firefox users in early 2020, CNET’s Stephen Shankland dug into those flaws. The most pressing of which are that DoH could centralize DNS activity and that it could offer companies a new way to track you online. Among DoH’s critiques, perhaps the most prescient quote came from Bert Hubert, creator of the PowerDNS software. 

“I find it highly disappointing that Mozilla decided, on behalf of all users it deems American, that this was a good idea,” Hubert said in an email. “While encrypted DNS is great, it matters a great deal who you encrypt your DNS to … They did not perform surveys, for example, on how people would feel about giving a trace of all their internet activities to Cloudflare.”

Read more: Cloudbleed bug: Everything you need to know

Theoretically, ODoH would reduce the amount of identifiable information Cloudflare would obtain about a user, compared to that which they’d see with DoH. Cloudflare hasn’t been free of security concerns, however. In 2017, a flaw dubbed Cloudbleed afflicted websites using Cloudflare’s products. Cloudflare fixed the problem, but the exposure included usernames, passwords, messages and other potentially identifying information. 

Criticism of the ODoH protocol came in January of this year, when digital privacy advocates at the Electronic Frontier Foundation cautioned that the protocol could ultimately facilitate more censorship than it overcomes. 

“One possibility worries us: Using ODoH gives software developers an easy way to comply with the demands of a censorship regime in order to distribute their software without telling the regime the identity of users they’re censoring,” EFF said. 

In other words, by choosing a reputable ODoH proxy that refuses to resolve censored websites, software companies could make headway into distributing software in heavily censored countries like China and Saudi Arabia so long as that censorship was baked in, such as by distributing a censored version of the software.

“This would remove any potential culpability that software developers have for revealing the identity of a user to a government that can put them in danger, but it also facilitates the act of censorship. In traditional DoH, this is not possible. Giving developers an easy-out by facilitating ‘anonymous’ censorship is a worrying prospect,” EFF said.

Cloudflare didn’t return CNET’s request for comment. 

apple-developer-screenshot-private-relay-gui-not-allowed.png

Apple

Aside from Apple’s reluctance to name their proxy partners, another roadblock for Private Relay users may be their own individual school or business networks. Most leading VPNs take measures to camouflage themselves and blend in with non-VPN traffic, but proxy servers are readily identified and blocked by most private networks. That means it’s going to be up to individual campuses and companies to allow proxy traffic from Apple devices. Otherwise, Apple said, you won’t be able to use the service. 

For right now, more is unknown than known about Private Relay. We expect more specifics and documentation to emerge about the gears of Private Relay as the full launch of iOS 15 and new MacOS/iPad OS approaches in the fall. Since a slow leak of discrete partnerships is par for course with Apple — at least as far back as its Maps-TomTom collaboration — we also expect more information to emerge about the nature and scope of its partnerships with third-party intermediaries.

Until then, Apple’s choice to blind themselves to user DNS requests with Private Relay could allow the company to put some distance between itself and the contentious debate over encryption more generally that it has recently been mired in. What remains to be seen is whether the tech giant’s use of the new ODoH protocol will push other browsers to adopt their own versions of it in lieu of the more widespread DoH. 

But even if Private Relay falls short of being a full-fledged VPN, Apple may well view it as a win-win: it gets to wrap itself in the privacy flag (a continuing differentiation upsell to users versus Google and Facebook), even as it collects less and less user data by default — potentially obviating subpoenas when government agencies come calling. 

Update, June 16: Adds clarifying language distinguishing app-routed from default device encryption, VPN-specific obfuscation from other obfuscation types and specifies browser-based IP address encryption benefit requirements.


Now playing:
Watch this:

We found these amazing features in the iOS 15 beta



17:38

source: cnet.com