No, Apple’s Private Relay is not a VPN, but you can still try it out with iOS 15

Apple touted its privacy work at its online WWDC event for developers.

Apple touted its privateness work at its on-line WWDC occasion earlier this yr.

Apple/Screenshot by Stephen Shankland/CNET

This story is part of Apple Event, our full coverage of the latest news from Apple.

When Apple introduced a trio of recent privacy perks for its iCloud Plus subscription service in iOS 15 at Apple’s WWDC occasion in June, the headliner was Private Relay — a browser-based encryption increase, aimed on the growing number of people who’re turning to virtual private networks for higher on-line privateness. Now, with iOS 15’s arrival on Monday (this is how to download iOS 15), a wider swath of Apple customers will be capable of check drive the proxy service for themselves. 

Though Apple executives have begun positioning the brand new Safari encryption service as a trustworthy alternative to commercial VPNs, Personal Relay just isn’t, strictly talking, a VPN. We’re nonetheless ready on the small print of how the service works, however complicated it for a VPN could show harmful to those that depend on them for private security, and ineffective for these searching for methods round authorities censorship. 

However, Personal Relay can be utilized alongside a conventional VPN, whether or not that is a private or firm VPN. Based on Apple builders, that presently means Personal Relay will ignore the visitors of your VPN. The tech behind Personal Relay, nevertheless, may theoretically symbolize a big leap ahead for general privateness amongst business (although not enterprise) VPN customers as extra analysis emerges on its potential to forestall a shady VPN provider from identifying you

Learn extra: Apple privacy updates tell you more about how apps use your data

With an underlying expertise that facilities on encryption, it is unlikely Personal Relay will probably be supplied in international locations the place it might intervene with home surveillance or contradict anti-encryption legal guidelines. Apple confirmed Personal Relay will not be out there in China, considered one of its most vital markets. Personal Relay can even be unavailable in Belarus, Colombia, Egypt, Kazakhstan, the Philippines, Saudi Arabia, South Africa, Turkmenistan and Uganda. 

Apple mentioned it can supply Personal Relay solely in accordance with native legal guidelines however that different introduced iCloud Plus privateness options, like Disguise My E mail, could also be out there in restricted areas as native legal guidelines allow. 

For the average US user, nevertheless, Personal Relay’s addition to Safari represents a doubtlessly groundbreaking shift in how browsers can be fundamentally reshaped to raised defend you from aggressive monitoring by advertisers. Greater than elevating the bar on browser privateness, nevertheless, a curious piece of underlying tech in Personal Relay is poised to open a brand new chapter within the browser wars. 

Learn extra: Change these browser settings ASAP to protect your privacy in Chrome, Firefox and more


Now playing:
Watch this:

iOS 15 best features: How Focus mode improved my iPhone


Apple Private Relay vs. a standard VPN

VPN Private Relay
Your public IP (where you are and who you are) is encrypted, start to finish Yes Yes*
Assigns you a new IP when you connect Yes Yes
All outgoing data from your device is encrypted via the app Yes No
You can overcome geo-location blocks and censorship to access media Yes No
Your traffic blends in with everyone else’s via VPN obfuscation Yes No

*Private Relay’s browser-based IP address encryption benefits are limited to Safari

How Private Relay is different to a VPN

No device-wide encryption via the app: While many VPNs offer a secondary, browser-only plugin, a true standalone VPN is designed to encrypt all of the information coming out of your device through its app. It will then assign you a new IP address, and connect you to one of its network of servers before spitting you out at your destination website. In Apple’s case, however, only some of your device’s traffic is specifically handled by Private Relay for encryption. In its developer-focused presentation, Apple said Private Relay encryption only covers Safari, the DNS-related traffic on your device, and a small subset of traffic from apps. Developers said any connections your app makes over the local network or to private domain names will be unaffected, and that any traffic that comes from using a proxy will also be exempt. In other words, if you use the Chrome browser from your iPhone, don’t expect any Private Relay protections or features.

No geo-blocking: A key feature of a VPN is the ability to overcome geographic restrictions and access global content on an open web. Some use that feature to access streaming media services while abroad and watch their home country’s entertainment catalog. But for those in countries burdened by censorship and oppressive regimes, VPNs offer the ability to circumvent geo-restrictions to safely access crucial information and news. Private Relay is explicitly designed to comply with geo-blocking and does not hide your general region or city from internet providers or authorities. 

No web traffic obfuscation: Encrypted web traffic created by using a VPN looks a lot different than non-VPN traffic, but the best VPNs camouflage themselves to appear like normal traffic in a process called obfuscation or, as it sometimes specified, VPN obfuscation. The ability to overcome geo-blocking and escape organizational networks relies on more than appearing to be from a different location; it relies on your traffic looking inconspicuous. That’s where VPN obfuscation comes in. Although Apple at times uses the term obfuscation in a non-technical sense to describe how their traffic may appear as normal traffic in some contexts, when you’re using Private Relay to connect to a business or school network, Private Relay’s proxy server traffic is readily identifiable and the service makes no effort to obfuscate itself with traditional VPN-type obfuscation. Accordingly, Apple developers have clearly offered instructions to business and school network managers on how to make allowances for this traffic, or how to isolate it for exclusion by blocking the hostname of the iCloud Private Relay proxy server.

Split-tunneling differences: A handy feature found among most leading VPNs, split-tunneling is an option that allows you to forgo device-wide encryption, in favor of encrypting only one or more apps on your device. Thus, you create two “tunnels” of internet traffic. This feature is helpful in several use-specific cases, like if you want to use a VPN to achieve faster torrenting speeds but you’d like to continue browsing normally. Private Relay has a similar feature that works differently. You can still use Private Relay even when you connect to your workplace’s private network, for instance. 

Multiple hop architecture: Many VPNs offer you the option of multi-hopping (or a “double hop”), which allows you to better cover your trail by connecting you to a series of servers, one after the next, before you land at a website. Private Relay offers what it calls “dual hop architecture,” which is different from VPN multi-hopping. When using Private Relay, the two “hops” you make first give you a new, semi-anonymous IP address, and then secondly decrypt the name of the website you’re requesting. 

Read more: Best iPhone VPN of 2021

What we know about Private Relay

Private Relay has two end goals. The first is to limit how much data advertising companies and ISPs can see about your browsing. The second goal is to ensure Apple can see only who you are and not what sites you’re visiting, while the third-party servers which get you to those sites can see where you’re going and your rough location but not who you are. 

Here’s how it’s done. Privacy Relay is built into both the forthcoming iOS and MacOS versions, but it will only work if you’re an iCloud Plus subscriber and you have it enabled from within your iCloud settings. 



Once it’s enabled and you open Safari to browse, Private Relay splits up two pieces of information that — when delivered to websites together as normal — could quickly identify you. Those are your IP address (who and exactly where you are) and your DNS request (the address of the website you want, in numeric form). 

Once the two pieces of information are split, Private Relay encrypts your DNS request and sends both the IP address and now-encrypted DNS request to an Apple proxy server. This is the first of two stops your traffic will make before you see a website. At this point, Apple has already handed over the encryption keys to the third party running the second of the two stops, so Apple can’t see what website you’re trying to access with your encrypted DNS request. All Apple can see is your IP address. 

Although it has received both your IP address and encrypted DNS request, Apple’s server doesn’t send your original IP address to the second stop. Instead, it gives you an anonymous IP address that is approximately associated with your general region or city. 

That approximate location can mean different things in different places, however.

“It’s obviously very different technology but in general with approximate location on the iPhone, the size of the area can change depending on the place in the world you are and population density and things like this,” an Apple spokesperson told CNET.

Using San Francisco as a hypothetical example, the size of that approximate location could narrow. 

“With the approximate location, I could be anywhere in the peninsula of San Francisco. So you could think that I’m up at the northern end of San Francisco near Ghirardelli Square or the app could be getting information that I’m down near Cesar Chavez [Street]. It nonetheless will get a exact location. It is simply that my exact location bounces round inside that basic space in such a means that nobody is aware of the place I truly am,” the spokesperson mentioned. 

As soon as it has assigned the brand new IP deal with, the Apple proxy server sends the encrypted DNS request and that new IP deal with to the following cease. That second cease is one other proxy server, one not run by Apple however by a presently unknown third-party firm that is able to decrypt your DNS request. 



Lastly, that third-party proxy server decrypts your DNS request and sends it to your vacation spot web site alongside along with your basic location. Whereas the vacation spot web site cannot pinpoint your actual location as a result of it does not have your true IP deal with, it might nonetheless see what area your system is in. 

The tech behind the scenes 

With the second proxy server’s potential to see what web sites you are requesting and your basic metropolis, the urgent query rapidly turns into who’s working that third-party server, a query Apple has up to now declined to reply. 

Inside hours of Personal Relay being introduced, nevertheless, it grew to become evident that Cloudflare is at the least considered one of Apple’s companions in powering Personal Relay when app researcher Jane Manchun Wong took to Twitter to verify she’d been issued an IP address belonging to Cloudflare whereas utilizing the presently out there developer model of Personal Relay. Wong’s tweet was adopted by a wave of different customers noting the identical outcomes, drawing comparisons between Personal Relay and proxy app Cloudflare Warp.

Cloudflare was a major partner in Apple’s push to standardize the possibly game-changing component of Personal Relay — its in-browser use of one thing referred to as Oblivious DNS-over-HTTPS, or ODoH.

What is the huge cope with ODoH? It is poised to reply a significant downside that has puzzled privateness advocates since 2018 when — in a earlier browser-encryption collaboration with Cloudflare — Mozilla pioneered a method to route web visitors referred to as DNS over HTTPS, or DoH, from inside a browser. A testomony to its anti-surveillance effectiveness, the brand new technique earned Mozilla the laughable award of “Internet Villain of the year” by a UK ISP foyer in 2019 — which means, primarily, the privateness expertise had the potential to interrupt the ISPs’ enterprise fashions that revolve round sucking up, bundling and promoting as a lot of your utilization knowledge as attainable. 

Although hailed as a breakthrough for privateness, the brand new technique wasn’t with out its flaws. 

When Mozilla enabled DoH for US Firefox customers in early 2020, CNET’s Stephen Shankland dug into those flaws. Probably the most urgent of that are that DoH may centralize DNS activity and that it may supply firms a new way to track you online. Amongst DoH’s critiques, maybe probably the most prescient quote got here from Bert Hubert, creator of the PowerDNS software

“I discover it extremely disappointing that Mozilla determined, on behalf of all customers it deems American, that this was a good suggestion,” Hubert mentioned in an e mail. “Whereas encrypted DNS is nice, it issues a terrific deal who you encrypt your DNS to … They didn’t carry out surveys, for instance, on how folks would really feel about giving a hint of all their web actions to Cloudflare.”

Learn extra: Cloudbleed bug: Everything you need to know

Theoretically, ODoH would scale back the quantity of identifiable data Cloudflare would receive a couple of person, in comparison with that which they’d see with DoH. Cloudflare hasn’t been freed from safety issues, nevertheless. In 2017, a flaw dubbed Cloudbleed stricken web sites utilizing Cloudflare’s merchandise. Cloudflare fixed the problem, however the publicity included usernames, passwords, messages and different doubtlessly figuring out data. 

Criticism of the ODoH protocol got here in January of this yr, when digital privateness advocates on the Electronic Frontier Foundation cautioned that the protocol may in the end facilitate extra censorship than it overcomes. 

“One chance worries us: Utilizing ODoH offers software program builders a simple method to adjust to the calls for of a censorship regime in an effort to distribute their software program with out telling the regime the id of customers they’re censoring,” EFF mentioned. 

In different phrases, by selecting a good ODoH proxy that refuses to resolve censored web sites, software program firms may make headway into distributing software program in closely censored international locations like China and Saudi Arabia as long as that censorship was baked in, comparable to by distributing a censored model of the software program.

“This could take away any potential culpability that software program builders have for revealing the id of a person to a authorities that may put them at risk, however it additionally facilitates the act of censorship. In conventional DoH, this isn’t attainable. Giving builders an easy-out by facilitating ‘nameless’ censorship is a worrying prospect,” EFF mentioned.

Cloudflare did not return CNET’s request for remark. 



Other than Apple’s reluctance to call their proxy companions, one other roadblock for Personal Relay customers could also be their very own particular person faculty or enterprise networks. Most main VPNs take measures to camouflage themselves and mix in with non-VPN visitors, however proxy servers are readily recognized and blocked by most non-public networks. Which means it should be as much as particular person campuses and firms to permit proxy visitors from Apple gadgets. In any other case, Apple mentioned, you will not be capable of use the service. 

For proper now, extra is unknown than recognized about Personal Relay. We count on extra specifics and documentation to emerge in regards to the gears of Personal Relay as the complete launch of iOS 15 and new MacOS/iPad OS approaches within the fall. Since a gradual leak of discrete partnerships is par for course with Apple — at the least way back to its Maps-TomTom collaboration — we additionally count on extra data to emerge in regards to the nature and scope of its partnerships with third-party intermediaries.

Till then, Apple’s option to blind themselves to person DNS requests with Personal Relay may permit the corporate to place far between itself and the contentious debate over encryption extra typically that it has not too long ago been mired in. What stays to be seen is whether or not the tech large’s use of the brand new ODoH protocol will push different browsers to undertake their very own variations of it in lieu of the extra widespread DoH. 

However even when Personal Relay falls in need of being a full-fledged VPN, Apple could nicely view it as a win-win: it will get to wrap itself within the privateness flag (a seamless differentiation upsell to customers versus Google and Fb), even because it collects much less and fewer person knowledge by default — doubtlessly obviating subpoenas when government agencies come calling

Replace, June 16: Provides clarifying language distinguishing app-routed from default system encryption, VPN-specific obfuscation from different obfuscation sorts and specifies browser-based IP deal with encryption profit necessities.


Now taking part in:
Watch this:

We discovered these wonderful options within the iOS 15 beta

17:38 | No, Apple’s Personal Relay just isn’t a VPN, however you possibly can nonetheless strive it out with iOS 15


Inter Reviewed is an automatic aggregator of the all world’s media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials, please contact us by email – The content will be deleted within 24 hours.

Related Articles

Back to top button