4.9 • 696 Ratings
🗓️ 22 September 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, September 22nd, 2021 edition of the Sandsenet Stormontas Stormcast. My name is Johannes Ulrich, |
0:09.7 | and I'm recording from Jacksonville, Florida. Today, I took a little bit a closer look at the private relay feature |
0:18.6 | that Apple included in iOS 15. |
0:22.6 | This feature is supposed to provide privacy similar to VPN services, and in particular, |
0:30.8 | they're actually using one server to receive the data, then forwarded to a second server |
0:37.3 | that will then emit the request |
0:40.3 | back into the internet. By having this sort of split setup under different administrative |
0:46.4 | control, they state that even an insider essentially wouldn't be able to link a particular |
0:53.1 | outgoing request with a specific user. |
0:57.0 | Now in order to connect to this, you need to have an Apple Plus subscription, so you do have to authenticate to the service as well. |
1:06.0 | All the data is being transmitted over UDP port 443. |
1:11.3 | So they're using Quick or HTTP 3 here in order to transmit the data. |
1:17.6 | The endpoints appear to have IPV4 as well as IPV6 addresses. |
1:22.1 | So even if you are in an IPV4 only network, you may be able to connect to IPV6 resources using this service. |
1:30.9 | While not specifically being built to sort of hide your location, there are two different |
1:38.1 | options, how you can assign yourself a location. You can let Apple work it out or you can use the country and time zone |
1:46.3 | settings on your particular device. Apple does publish a list of all the ECRS IP addresses |
1:53.7 | that are used for this service. So in short, it's pretty close to a VPN, but not quite in particular. Some apps may not take |
2:05.3 | advantage of it. I experiment, for example, with the Ucla Speed Test application, and it did not |
2:12.6 | use the private really. To detect if someone on your network is using private really, look for |
2:20.2 | DNS requests for mask.iCloud.com or mask dash h2.ICloud.com. And by blocking these DNS requests, |
2:31.2 | you can also block the use of private relay. So overall, it's not bad, but |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.