{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigjxv5mqtdplnxslhyajlyegbxasvzlfrb7ziqh3shvnm7wamp3wa",
"uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mkhntvbk74x2"
},
"path": "/t/ios-26-4-2-patches-flaw-that-let-fbi-extract-deleted-signal-messages/37359#post_18",
"publishedAt": "2026-04-27T07:53:12.000Z",
"site": "https://discuss.privacyguides.net",
"tags": [
"gateway.icloud.com",
"metrics.icloud.com",
"mask.icloud.com",
"mask-api.icloud.com"
],
"textContent": "I’ve had a more in depth look into this and via DNS. Since activating the Mullvad patch, there has definitely been no outside tunnel leaks.\n\nApple’s own (e.g. gateway.icloud.com, metrics.icloud.com, mask.icloud.com, mask-api.icloud.com) all favoured Apple routing and would frequently ping from my true IP. Their weather one did, too, which was quite frustrating as that weather uses current location. I’ve not had a single instance of this since the Mullvad patch and, prior to this, they would expose my true IP several times a day!\n\nIn fairness, I didn’t see any other apps bypass the VPN other than Apple. I know it’s possible, and I don’t keep logs for long, but I hadn’t noticed. Although I tried to test this with different apps open prior to making the connection to Mullvad, it always seemed to be Apple domains only.\n\nI’ll update again when I get the inevitable update issue, which I’m not looking forward to as I’ll have to update without the VPN on…. Although I do have Proton VPN I could use for that brief period.",
"title": "iOS 26.4.2 Patches flaw that let FBI extract deleted signal messages"
}