299
submitted 6 months ago by lemmyreader@lemmy.ml to c/privacy@lemmy.ml
top 50 comments
sorted by: hot top controversial new old
[-] darcmage@lemmy.dbzer0.com 55 points 6 months ago

"The report detailed how the user managed to leak DNS queries when disabling and enabling VPN while having “Block connections without VPN” on."

Not to diminish the severity of the issue but I can't imagine this being the factor that pushes the average person to ios over android.

load more comments (9 replies)
[-] Scolding0513@sh.itjust.works 40 points 6 months ago

Mullvad is awesome. i think this is the second android bug/incident they brought to light?

Anyway, really really hope this gets fixed upstream, maybe by Graphene

How much you wanna bet this was intentional by Google? 😏

[-] viking@infosec.pub 7 points 6 months ago

They didn't bring it to light, it was a user report posted on reddit. They merely investigated it further. Nothing against mullvad, it's a great vpn, but credit where credit is due.

load more comments (1 replies)
[-] Tundra@lemmy.ml 11 points 6 months ago

What I don't understand though, doesn't using mullvad automatically set their own DNS?

[-] lemmyreader@lemmy.ml 6 points 6 months ago

On the desktop it does. But on Android things are maybe different ? Not directly related but I remember (long time ago) wanting to tether from an Android phone with Mullvad VPN app in use, to a computer, only to find out that the Android defaults (In Android not in the Mullvad app) needed a button swiped to make it work correctly on the other device.

[-] Railcar8095@lemm.ee 4 points 6 months ago

I thought sharing the VPN was blocked and not possible. Do you remember how you did?

[-] Tundra@lemmy.ml 3 points 6 months ago

Ive recently managed to do this;

Settings> Network & Internet> Hotspot & Tethering> Allow Clients To Use VPN

[-] Railcar8095@lemm.ee 3 points 6 months ago

Not in pixel :( I would love this

load more comments (1 replies)
load more comments (1 replies)
[-] jjlinux@lemmy.ml 5 points 6 months ago

Only if your Android connection is set to automatic DNS. Additionally, they are assuming it is an OS bug. However, they also acknowledge that they had to fix something on their app to mitigate. I tried myself with Wireguard instead, killed the network access to it, and nothing ever left my phone, as Android immediately killed all connections due to the VPN always on feature.

So, I'm going to take their claim with a grain of salt until AOSP says something about this and denies or confirms the alleged bug.

[-] N0x0n@lemmy.ml 10 points 6 months ago

Just use rethink dns with a wireguard tunnel and block every app except those you trust and need !

[-] MSugarhill@feddit.de 3 points 6 months ago

I tried out rethink DNS but I did not manage in any way to just use my VPNs DNS. Would you have a hint how to make it work?

load more comments (3 replies)
load more comments (3 replies)
[-] Pantherina@feddit.de 5 points 6 months ago

Any system app on Android, the captive portal login and more CAN all bypass a VPN in "block all other connections" mode.

Android is really problematic and having as little system apps as possible is the only fix.

load more comments
view more: next ›
this post was submitted on 03 May 2024
299 points (99.7% liked)

Privacy

31609 readers
237 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS