Be careful how you use it, the data does not go through completely

Be careful how you use it, the data does not go through completely

The power of VPNs is well known: connectivity and provisioning. But the dark side of it can create a lot of trouble for many users who are now using it in ever larger numbers.

Android devices with VPN They may intentionally lose traffic, including IP addresses and requests DNS / HTTP (S)when connected to a wireless network.

Android –

This was revealed by a security audit of Mullvad VPN: For the loss of a small amount of data, it must be searched for in the mobile operating system, which is something that third-party VPNs cannot prevent or control.

What feature for Google is wrong with Mullvad VPN

The VPN service provider, made in Europe, is setting off what is actually an alarm: also enable an always-on VPN, using “Block connections without a VPNIt will not help solve the problem.
Mullvad VPN is convinced that the Google feature will in fact be a bug, built into Android. In short, VPNs will not be the problem, but the operating system of the Mountain View giant itself. Or maybe not?

We’ve reviewed your feature request and would like to let you know that it’s working as expectedThis is the answer from a Google engineer to Mullvad VPN on the search giant’s issue tracker page.

VPN - 20221015

We don’t think such an option would be understandable to most users, so we don’t think there is a compelling reason to offer it.“.

When an Android device connects to a public network, it performs certain checks before it successfully establishes the connection. Here, to perform these checks, Mullvad VPN It was found that Android sends data from the secure (encrypted) tunnel, which protects users when they are online.

See also  New multiplayer modes leak revealed -

This is where the biggest problem comes in, Mullvad managers reported that at this point Android devices don’t pass all data through the VPN, once it’s activated.

Block connections without a VPNInstead, it’s an Android setting designed to prevent what might happen during connection checks. “split tunneling – Google confirms – It can also distract some traffic on the core network

Let’s understand why Android wants to send this traffic by default – Continue from Mullvad – if there is, for example, a file captive gate (usually a web page is displayed after the device is connected to a new public network, editor) On the network, the connection will be unusable until the user logs in“.

The issue reported by Mullvadd will be an even bigger issue, as VPNs on Android will lose traffic data even on known networks that don’t have a “restricted gateway”. Mullvad VPN for Google’s suggestion is to disable connection checking by default, to give users the ability to turn it on when they feel necessary.

Kind of like functionality in Android privacy and security-focused iteration, graphenes.

Leave a Reply

Your email address will not be published. Required fields are marked *