Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Running entirely in RAM is same as running from an encrypted disk, with keys available only to whoever can dump the RAM.

A better solution would be something like Apple’s private relay.

Also, either you trust the provider or you don’t.



Apple’s private relay is just CloudFlare WARP with some additional IP blocks + locality built in, not?

I wouldn’t bet on it being super secure in case law enforcement comes after you, for example.


Here’s the whitepaper: https://www.apple.com/privacy/docs/iCloud_Private_Relay_Over...

They do two hops, first to an Apple-controlled server, then to the “second relay” which is operated by Cloudflare in a lot of cases. Encryption is terminated at the second relay.

So Cloudflare sees the content (or whatever is visible in a TLS stream), and Apple sees your real IP, but neither can know both without collaboration.


And of course they do not collaborate. /s


Unfortunately, if we assume everyone collaborates there is no hope of privacy.


Not exactly. WARP hides your content and IP from anyone but the destination website. The website can still track the user. Apple mixed it with own relay such that neither Apple nor Cloudflare can track the IP and content simultaneously.

It’s mostly an anti-tracking feature. But also now government needs cooperation from two companies.

On another note, WARP is a VPN. But Mullvad is preferred to WARP, because Cloudflare most likely logs connections for some time.


You seem to be contradicting yourself.

> A better solution would be something like Apple’s private relay.

then

> On another note, WARP is a VPN. But Mullvad is preferred to WARP


Private relay (WARP + relay) > Mullvad > WARP

But keep in mind that private relay applies only to Safari traffic. For applications, use Mulvad.


I would trust real TOR much more than Apple's pseudo-TOR. They control all the entry and exit nodes so correlation attacks are quite viable. Might as well chain two VPNs if you want a TOR-like experience without slowdowns. Bonus feature is that you can rotate providers.


Of course, but Tor speeds are KB/s or low Mb/s in my experience.


Not really equivalent. There are possible attacks based on: key generation process, stored data correlation, access patterns, etc. You're much safer if you don't store anything in the first place.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: