[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

[Advertise on 4chan]


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


Applechads, are we tired of winning yet?

>complete anonymity from ISP, Apple and any websites you visit
>basically TOR but faster
>ZERO logging
>from 0.99cents a month

APPLECHADS WE HAVE WON
>>
>>82642201
Based and iOS15 pilled
>>
>>82642201
>completely proprietary so they're 100% lying
>you have to pay
Do iToddlers really?
>>
>>82642309
Meds. Now.
>>
>>82642309
lol BLM distro
>>
>>82642201
daily reminder that icloud is hosted on GOOGLE CLOUD PLATFORM. By using icloud services you are storing your data on google. This is 100% fact and can be easily verified using a simple internet search.
>>
>>82642362
But no data goes to iCloud anon. Just a token containing that you are making a request. The request itself goes to the ingress server, where your information is stripped out and a fake IP assigned, at that point the request is decrypted and sent to the Egress server, so Apples Ingress server only knows your IP, and the egress server only knows the request you made but not your IP. It’s a perfect system.
>>
>>82642201
>>complete anonymity from ISP, Apple and any websites you visit
100% false
>>basically TOR but faster
is nothing like tor, computer illiterate pedophile
>>82642290
> samefagging this fucking hard
itoddler pedophiles truly are the most subhuman trash on the planet.
>>
File: 1612905349147.png (741 KB, 829x415)
741 KB
741 KB PNG
>>82642393
> fantasy buzzwords that make little sense
>>
>>82642393
>Apples Ingress server only knows your IP,
>Apples Ingress server is hosted on Google infrastructure.
Which means that GOOGLE knows your IP.
>>
>>82642524
>>82642542
>>82642559
>Private Relay splits up the data into two pieces. The IP address to see who and exactly where you are and DNS request to see the address of the website you are visiting.

>Once Private Relay splits the data, it encrypts the user’s DND request and delivers both the IP address and decrypted DNS request to an Apple proxy server. Here, Apple has already sent the encryption keys to the third-party server. So, even Apple can’t see what website you are trying to access your encrypted DNS request. All Apple has is your IP address.

>Apple servers don’t send the IP address, though. Instead, it gives you an anonymous IP address that is approximately linked with your region or city. However, that approximate location can mean different things in different places.

>A third-party proxy server decrypts your now-anonymous DNS request and sends it to your destination website along with your general location. Apple hasn’t announced the provider behind the third-party proxy server.

Meds. Now.
>>
>>82642559
and apple knows your ip, and knows what sites you're visiting. you have as much privacy as living in a house made out of glass. even the site you're visiting will know it's from an apple service but not know your personal IP. since the IP address will be from an apple service, it won't take much for law enforcement to track its source. any VPN other than apple's is far more secure than this.
>>82642588
> advertising cancer that's completely meaningless
itoddler pedophiles, everyone. one day you won't be such an embarrassment to humanity - that'll happen when the sun exhausts all of its fuel. consider suicide, thanks.
>>
>>82642588
Apple uses an RSA-bound access token that's not linkable back to you and a public/private key system to verify your access to the ingress proxy server.

The connection uses QUIC, which is meant to be like TCP but with lower latency and HTTP/3, and because Apple encrypts the connection, even your ISP can't see where it is on the web you want to go. All they see is the connection to Apple's ingress proxy server. So, Apple knows your IP, but not the website you want to go to because that's encrypted.

At that point, Apple will strip away your real IP address and replace it with a temporary IP address from a pool of available addresses. This can be a local IP address, if you still want to be able to get local services or search results, for nearby Slurpy Burgers, for example, or a rando IP where the most someone will be able to get from it is your country or region.

In iCloud Internet Privacy settings, you can switch between Maintain General Location or Use Country and Time Zone for the temporary IP at any time.

Apple then forwards your connection on to a second relay, an egress proxy server. That server isn't owned by Apple. So it could be… Cloudflare or something similar. There are a bunch of different egress proxy servers and a token-based system to randomly assign them, which is like another layer in the privacy sammich
>>
File: 1608531943646.png (476 KB, 750x2200)
476 KB
476 KB PNG
>>82642201
Get a toilet ranjeet.
>>
>>82642613
Lol no
> Just like a VPN, all the traffic that passes through iCloud Private Relay is encrypted, and the first proxy server in the chain — the one owned by Apple — is the only one that knows your original IP address. However, this server, also known as the “ingress proxy”, can’t see or inspect your surfing traffic — it simply passes everything on to the second “egress proxy” server.
>>
File: 1607644308764.png (269 KB, 922x893)
269 KB
269 KB PNG
>>82642650
>iNigger trusting iJeets
>>
>>82642675
>schizo with no reading comprehension
>>
>>82642201
>buying privacy products from a PRISM affiliate
do ijeets really?
>>
>>82642785

Never happened

https://www.apple.com/apples-commitment-to-customer-privacy/

> Two weeks ago, when technology companies were accused of indiscriminately sharing customer data with government agencies, Apple issued a clear response: We first heard of the government’s “Prism” program when news organizations asked us about it on June 6. We do not provide any government agency with direct access to our servers, and any government agency requesting customer content must get a court order.

>Apple has always placed a priority on protecting our customers’ personal data, and we don’t collect or maintain a mountain of personal details about our customers in the first place. There are certain categories of information which we do not provide to law enforcement or any other group because we choose not to retain it.

>For example, conversations which take place over iMessage and FaceTime are protected by end-to-end encryption so no one but the sender and receiver can see or read them. Apple cannot decrypt that data. Similarly, we do not store data related to customers’ location, Map searches or Siri requests in any identifiable form.
>>
>>82642675
debunked https://blog.jacopo.io/en/post/apple-ocsp/
>>
>>82642201
> from 0.99cents a month
No. Not only you get private relay, but you also get hide my email, which is like Anonaddy but leveraging the iCloud domain, so nobody can block it, you get 50 of cloud storage and if you’re into HomeKit you get 1 security camera @1080p end to end encrypted footage AND it doesn’t count against your storage.

You have no reason NOT to get the base offering at that price.
>>
>>82642201
>complete anonymity from... Apple
Nigga, you're literally using their VPN. They will get all your non-encrypted data. AND because you're using THEIR devices on THEIR VPN, they know exactly what you're doing.
>>
>>82642201
>>complete anonymity from ISP, Apple and any websites you visit
Then how the fuck do they know you paid for it or are using an iPhone?
Tim could shit in a box and all you retards would line up to pay $2k for it.
>>
>>82642588
I don't know where you copied this from but there are a number of errors in that.
>At this point, Apple has already handed over the encryption keys to the third party running the second of the two stops, so Apple can't see what website you're trying to access with your encrypted DNS request.
Apple should not be handling your keys.
The whole point of doing an encrypted DNS request is that you have a secure connection to the DNS server. That means you negotiate the keys together.
If Apple is handling the keys, this is not designed around security or privacy. It's a shitshow.
>>
>>82642201
what are correlation and timing attacks.
what are backdoors.
what are weak encryption keys.

reminder that Apple actively helps the NSA spying program according to leaked documents. you might as well just record all your traffic with wireshark and send it monthly to the NSA.
>>
>>82644620
>you might as well just record all your traffic with wireshark and send it monthly to the NSA
Like nsa or other govt agency couldn’t do that already
> Hello anon, we are here to upgrade your internet plan for free! We just need to upgrade your modem, our trchnicians will be there in 10 minutes!
>>
>>82642201
so it's a iNordVPN?
>>
>we do not store data trust us
even no-log vpn:s store data, it's required to make the service work, this is no different and because apploo i raise concern
>>
>>82644768
No. It's literally worse than NordVPN.
>>
>>82644371
Encrypted on device not on server
>>82644492
Your device sends an anonymous token, as soon as the ingress server sees this it passes your request to the egress server.
>>
>>82645624
>Encrypted on device not on server
But decrypted before it leaves their service, yes, that's how it works.
Not that it matters because as explained in >>82642588 Apple is handling the keys.
Apple's attempt to obfuscate you from the outside servers results in a situation where you cannot create a secure connection with the outside server anymore. Apple handles the keys.
And because Apple is handling the keys, they could easily "oops saved the keys accidentally" and "oops logged the data".

This is not privacy. It is designed to be backdoored.
>>
File: android_pajeets.jpg (347 KB, 1200x1200)
347 KB
347 KB JPG
>>82642629
?
>>
>>82642201
>>complete anonymity from ISP, Apple and any websites you visit
>>basically TOR but faster
>>ZERO logging
Top fucking kek
>>
Guys here use my private ULTRA PRIVATE SAFE relay network (won't spy(make it easier for me)free) no one see ultra private 163.56.67.1 :)
>>
>>82645680
> When this is enabled, all of your browsing activity in Safari will be routed through two internet “hops,” or relays. Your data is encrypted and then sent to Apple, so your ISP can’t see any of your web browsing requests. Once at Apple’s proxy server, the DNS request (the thing that points a domain name like “macworld.com” to a specific server IP address) and your iPhone or Mac’s IP address are separated. Your IP address is retained by Apple, while your DNS request is passed on, encrypted, to a “trusted partner” that has the decryption key, along with a fake intermediary IP address that is based on your approximate location

> This means that Apple knows your IP address but not the name of the sites you’re visiting, and the trusted partner knows the site you’re visiting but not your IP (and therefore not who you are). Neither party can piece together who you are and where you’re going.
>>
>>82645753
>while your DNS request is passed on, encrypted, to a “trusted partner” that has the decryption key
But not a decryption key that you have negotiated with them.
Your client does not negotiate this key.
>Apple has already sent the encryption keys to the third-party server.
Apple decided this key. Apple has passed the key to the "trusted partner".
Apple has the keys. If they DON'T decrypt it during the process doesn't mean they CAN'T. The way this is described they certainly CAN.
>>
>>82645753
Just give them remote access to your device at this point and be done with it
>>
>>82645787
This. It’s probably “coded” by some blue haired tranny who think trusting in the government is a good idea.
>>
>only pedos and criminals use tor!
>apple does it
>WHAT NOW CHUDS?!
>>
>>82645787
Meds. Now.
>>
>>82642201
Trusting tim cuck to not fuck you. You itoddlers are really this fucking dumb. Do they really like the smell of there own farts this much
>>
>>82645850
No. I do not require meds.
Just fucking read how they say it works instead of copy pasting. Apple is in control of the keys. They could have set it up in a way so that Cloudflare provided a public key that Apple then shipped in their software which the clients would use to encrypt the data before sending to Cloudflare, including the clients public key so Cloudflare could encrypt the response.
But that isn't what is said.
>Apple has already handed over the encryption keys to the third party running the second of the two stops
Apple has handled the keys. From a security point of view this is a gigantic red flag. If you want secure communications between A and B, you don't want the middleman handling the keys.



Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.