Inside iCloud+ Private Relay: can it be trusted? (2024)

There are lots of good reasons for not wanting to expose your IP address when you connect to a website. For most of us, at least those fortunate enough to live under regimes which aren’t overtly oppressive, the prime reason is to prevent sites capturing data about us: it’s mostly about privacy.

Unfortunately, VPN isn’t a single clear-cut protocol, and requires a great deal of trust between you and your VPN service. It isn’t hard to envisage a VPN provider using your information to their advantage, as they could be quietly logging every last detail of all the connections you make through their service. Recently, concern has been expressed that some quite popular VPN services are owned by companies which operate from jurisdictions which don’t protect privacy well, or which could be directed to release information from their logs. As if to deepen the distrust, several of these articles are clearly unannounced promotions for competing VPN providers. So who can you trust to provide your VPN service?

Apple announced an alternative at WWDC last June, in its iCloud+ Private Relay service, and just before Christmas published a more detailed overview of that service, which is still officially in beta-release in Monterey 12.1 and its equivalents in iOS and iPadOS. In addition to describing in detail the service as it currently operates, it spells out those services and situations which don’t benefit from its Private Relay.

How it works

The way this works is through two sets of relay servers. The first relay, operated by Apple, knows your IP address but not the destination address you’re connecting to. The second relay, operated by a major content delivery network like Cloudflare or Akamai, doesn’t know your real IP address, but does know the destination.

As IP addresses bear some location information, which is often important for your connections, the Relay IP used by the second relay is chosen according to one of two options as to how local that should be. You can opt for that to preserve your country and time zone, or to be vaguer and merely place you within a larger region. For example, when I opt for the more specific, my Relay IP usually locates me in London, around 70 miles away. If I change to use the regional option, the Relay IP could come from any part of the UK, including Scotland, more than 500 miles distant.

Regional information is important for many website connections, for example to verify that you are entitled to access geographically limited media and services. Many sites use it to redirect your connection to localised sites which default to your preferred language and currency. Of course if you give explicit permission, sites can obtain more precise locational information, but you control that locally: for example, location information is only provided by Safari to sites listed for the Location item in the Websites tab in its Preferences.

The first step in establishing a Private Relay connection is for the first relay to verify that your Mac is in good standing with Apple’s iCloud+ service, which checks both the device and account. Apple touts this as giving remote services good levels of protection from fraud and abuse.

Next, the first relay provides your Mac with a Geohash, which is used by the second relay, in conjunction with your location option, to allocate the Relay IP. DNS name resolution uses encryption with a network proxy in Oblivious DNS over HTTPS (ODoH) to protect the privacy of DNS name resolution performed in the Private Relay service.

Apple assures us that the logs maintained by its Private Relay service are minimal, and don’t contain any personal identifiers. The closest they come is the network and regional information derived from IP addresses.

Limitations

When turned on, Private Relay doesn’t attempt to protect certain connections. These include:

  • Any traffic to the local network. Relaying is only available to public internet servers.
  • Cellular services including MMS, telephony (XCAP), Entitlement Server access, tethering traffic, and Visual Voicemail. I think those are also excluded from VPNs.
  • Traffic routed through a VPN, which always takes precedence, as does a proxy configuration such as Global Proxy.
  • Certain geographical areas, where Private Relay isn’t available.
  • Currently, third-party browsers etc. don’t appear able to use any Private Relay features, which are confined to Safari and other Apple products. VPNs normally work with all software regardless of its vendor.

Custom DNS settings can also affect part or all of Private Relay. If your Mac has custom encrypted DNS configured in a profile or app, that DNS service will be used instead of its own ODoH. Safari connections and unencrypted HTTP connections will resolve names with the DNS server specified before being routed through Private Relay. However, a local unencrypted DNS server, or one set manually in the Network pane, won’t be used for Private Relay traffic.

If you want to block the use of Private Relay, for example on a network which requires all traffic to be audited, the simplest way to do that is to prevent DNS resolution for mask.icloud.com and mask-h2.icloud.com hostnames.

VPN or Private Relay?

Despite its careful design, Private Relay still does have problems with certain sites and services. Where possible, Apple is preferring to advise the user when a connection can’t be made, rather than expecting the user to build and maintain an exception list. Otherwise the service now appears quite robust and performs well.

The decision whether to use VPN or Private Relay comes down to:

  • Does Private Relay provide the protection you want, or do you require a proper VPN?
  • Does Private Relay work with all your key websites?
  • Does Private Relay protect the apps you use, or do you use a third-party browser?
  • Can you put full trust in your VPN service, its operator, and the jurisdiction from which it operates?

From what I see, iCloud+ Private Relay almost invariably wins when it comes down to trust. And the fact that I currently pay less than $/€/£ 1 per month for my iCloud+ service.

Inside iCloud+ Private Relay: can it be trusted? (2024)

FAQs

Inside iCloud+ Private Relay: can it be trusted? ›

iCloud Private Relay is designed to protect your privacy by ensuring that when you browse the web in Safari, no single party — not even Apple — can see both who you are and what sites you're visiting. When Private Relay is enabled, your requests are sent through two separate, secure internet relays.

Can an iCloud private relay be tracked? ›

When iCloud Private Relay is on, the traffic leaving your iPhone is encrypted and sent through two separate internet relays. This prevents websites from seeing your IP address and exact location while preventing network providers from collecting your browsing activity in Safari.

What is the disadvantage of iCloud private relay? ›

The Apple Private Relay feature can slow your internet speed slightly. That is because it uses encryption to hide your web requests from your ISP and third parties.

Is iCloud Relay traceable? ›

Unlike a traditional VPN, iCloud Private Relay's dual-hop architecture ensures no single party has access to both the user's IP address and the details of their browsing activity. Private Relay also does not allow users to represent themselves as connecting from a different country or region.

Does private relay hide my history? ›

When you subscribe to iCloud+, you can use iCloud Private Relay on your iPhone, iPad, iPod touch, and Mac to hide your IP address and browsing activity in Safari and protect your unencrypted internet traffic.

Is iCloud private relay really secure? ›

When Private Relay is enabled, your requests are sent through two separate, secure internet relays. Your IP address is visible to your network provider and to the first relay, which is operated by Apple. Your DNS records are encrypted, so neither party can see the address of the website you're trying to visit.

Is iCloud Private Relay anonymous? ›

Internet connections set up through Private Relay use anonymous IP addresses that map to the region a user is in, without divulging the user's exact location or identity.

Does iCloud Private Relay keep logs? ›

DNS name resolution uses encryption with a network proxy in Oblivious DNS over HTTPS (ODoH) to protect the privacy of DNS name resolution performed in the Private Relay service. Apple assures us that the logs maintained by its Private Relay service are minimal, and don't contain any personal identifiers.

How do I know if my iCloud private relay is active? ›

Detecting iCloud Private Relay IP addresses using IP2Location database. To check whether the IP is part of the iCloud Private Relay, you just need to read the ISP column in the IP2Location IP geolocation database. If the ISP value is “iCloud Private Relay” then that IP belongs to the iCloud Private Relay.

What happens if I turn my private relay off? ›

If you turn off Private Relay, network providers and websites can monitor your internet activity in Safari. If you travel somewhere that Private Relay isn't available, it will automatically turn off and will turn on again when you re-enter a country or region that supports it.

Can iCloud be tapped? ›

No one else can access your end-to-end encrypted data — not even Apple — and this data remains secure even in the case of a data breach in the cloud. If you lose access to your account, only you can recover this data, using your device passcode or password, recovery contact, or recovery key.

Can someone track your phone through iCloud? ›

If the “Find My Phone” feature is turned on in the device settings, users can find the location of the device by logging into iCloud. This feature is meant to help you find your device if it is lost or stolen; however, some people could use this feature to locate another person.

Can police track iCloud? ›

iCloud content, as it exists in the customer's account, may be provided in response to a search warrant issued upon a showing of probable cause, or customer consent.

Can you be tracked with private relay? ›

That means your in-app activity from Instagram, TikTok or any other browser like Chrome does not get hidden the same way. 3. Private Relay does not fully shield your browsing habits. By accepting cookies, you can still be tracked.

Is Apple Private Relay better than VPN? ›

Users can choose which server they want to use and the location of the server. Users have more control over the servers they want to use. In a nutshell, Private Relays enhance your privacy only within the Apple ecosystem, whereas VPNs offer a more enhanced security experience.

Can someone check my private browsing history? ›

Is incognito mode safe? The terms “private search” and “incognito mode” sound great. But while your history is erased on your device, it's still visible to the outside world. Even when you're in incognito mode, websites, your ISP, and your network can still see your IP address and browsing history.

Can iCloud track private browsing? ›

Apple can trace your internet traffic too. The website may not store cookies while browsing in a private mode. However, Apple itself stores your data. This applies to all devices of apple and not only just the iPhone.

Can the police track a iCloud? ›

iCloud content, as it exists in the customer's account, may be provided in response to a search warrant issued upon a showing of probable cause, or customer consent.

Top Articles
Working Copy Ensign - DailyPay Frequently Asked Questions Updated 3-9-2022
Instant $100 Loan | Fast Approval | Net Pay Advance
Victor Spizzirri Linkedin
Kmart near me - Perth, WA
Cars & Trucks - By Owner near Kissimmee, FL - craigslist
Regal Amc Near Me
Craigslist Campers Greenville Sc
Google Sites Classroom 6X
Black Gelato Strain Allbud
Sportsman Warehouse Cda
Computer Repair Tryon North Carolina
Jcpenney At Home Associate Kiosk
Hallelu-JaH - Psalm 119 - inleiding
Regular Clear vs Low Iron Glass for Shower Doors
I Wanna Dance with Somebody : séances à Paris et en Île-de-France - L'Officiel des spectacles
Elizabethtown Mesothelioma Legal Question
Christina Khalil Forum
The Cure Average Setlist
Q33 Bus Schedule Pdf
R Cwbt
Promiseb Discontinued
Melendez Imports Menu
Lakewood Campground Golf Cart Rental
Getmnapp
Used Patio Furniture - Craigslist
Spectrum Outage in Queens, New York
Abga Gestation Calculator
Yu-Gi-Oh Card Database
3 Ways to Format a Computer - wikiHow
Progressbook Newark
Christmas Days Away
South Florida residents must earn more than $100,000 to avoid being 'rent burdened'
Eaccess Kankakee
47 Orchid Varieties: Different Types of Orchids (With Pictures)
Garrison Blacksmith's Bench
Restored Republic December 9 2022
Frcp 47
Ursula Creed Datasheet
Kelly Ripa Necklace 2022
Oxford House Peoria Il
Encompass.myisolved
Janaki Kalaganaledu Serial Today Episode Written Update
Acts 16 Nkjv
Weekly Math Review Q2 7 Answer Key
Arcane Bloodline Pathfinder
Craigslist Farm And Garden Reading Pa
Atu Bookstore Ozark
Lightfoot 247
De boeken van Val McDermid op volgorde
15:30 Est
Coors Field Seats In The Shade
Texas Lottery Daily 4 Winning Numbers
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 5921

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.