{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigjxv5mqtdplnxslhyajlyegbxasvzlfrb7ziqh3shvnm7wamp3wa",
    "uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mkhntvbk74x2"
  },
  "path": "/t/ios-26-4-2-patches-flaw-that-let-fbi-extract-deleted-signal-messages/37359#post_18",
  "publishedAt": "2026-04-27T07:53:12.000Z",
  "site": "https://discuss.privacyguides.net",
  "tags": [
    "gateway.icloud.com",
    "metrics.icloud.com",
    "mask.icloud.com",
    "mask-api.icloud.com"
  ],
  "textContent": "I’ve had a more in depth look into this and via DNS. Since activating the Mullvad patch, there has definitely been no outside tunnel leaks.\n\nApple’s own (e.g. gateway.icloud.com, metrics.icloud.com, mask.icloud.com, mask-api.icloud.com) all favoured Apple routing and would frequently ping from my true IP. Their weather one did, too, which was quite frustrating as that weather uses current location. I’ve not had a single instance of this since the Mullvad patch and, prior to this, they would expose my true IP several times a day!\n\nIn fairness, I didn’t see any other apps bypass the VPN other than Apple. I know it’s possible, and I don’t keep logs for long, but I hadn’t noticed. Although I tried to test this with different apps open prior to making the connection to Mullvad, it always seemed to be Apple domains only.\n\nI’ll update again when I get the inevitable update issue, which I’m not looking forward to as I’ll have to update without the VPN on…. Although I do have Proton VPN I could use for that brief period.",
  "title": "iOS 26.4.2 Patches flaw that let FBI extract deleted signal messages"
}