The Tug-of-War Between Mobile OS and VPN Security
For years, the promise of a VPN has been a “secure tunnel” for all your data. However, the reality on mobile devices—specifically Apple’s iOS—has been more complicated. The tension between a closed-ecosystem operating system and the need for absolute privacy has created a landscape where “leaks” are a persistent threat.

The core of the issue lies in the intricacies of Apple’s NetworkExtension framework. Because of how iOS handles networking, some traffic can bypass the VPN tunnel entirely. This creates a vulnerability where sensitive data might be exposed to the open internet without the user realizing it.
Understanding the Threat: TunnelVision and TunnelCrack
The industry is currently grappling with sophisticated attacks known as TunnelCrack and TunnelVision (CVE-2024-3661). These attacks don’t break the encryption itself; instead, they trick the device into thinking certain public IP ranges should be routed via the local network rather than the VPN.

This is achieved by an attacker acting as a DHCP server on the same local network. By sending specific instructions to the victim’s device, they can force plaintext traffic to leak, allowing them to observe the data. While desktop versions of Mullvad VPN use firewall rules to block this, iOS lacks the same level of control.
Interestingly, not all mobile platforms are equally affected. Android, for example, is not vulnerable to TunnelVision because it does not implement DHCP option 121, a key component the attack relies on.
The Shift Toward “Hardened” Privacy Configurations
To combat these leaks, a new trend is emerging: shifting the responsibility of “hardened” security to the user. A prime example is the implementation of the includeAllNetworks configuration, branded as a “Force all apps” feature.
When enabled, this setting forces all iOS app traffic into the tunnel, effectively closing the gaps that TunnelVision and LocalNet exploit. However, this security comes with a significant trade-off in user experience. Because of bugs in Apple’s networking stack, this configuration can trigger a “broken update loop.”
In this scenario, iOS may brick the networking stack while attempting to update the VPN app, forcing the user to reboot their phone. To mitigate this, privacy-focused providers are now implementing warning systems to alert users to disconnect their VPN or disable the “Force all apps” setting before an update occurs.
Future-Proofing: Quantum Encryption and AI Defense
As attackers obtain smarter, the next frontier of VPN evolution is moving beyond simple tunneling. We are seeing a shift toward “future-proof” encryption and AI-resistant protocols.

One major trend is the adoption of post-quantum encryption. This is designed to protect data today against the threat of ultra-fast quantum computers that could potentially crack current encryption standards in the future. By implementing these protocols now, VPNs ensure that captured encrypted data cannot be decrypted years down the line.
the rise of AI-guided traffic analysis—where machine learning is used to identify patterns in encrypted data—is forcing providers to adopt new protocols. These updates aim to mask traffic patterns, making it harder for observers to determine what a user is doing, even if they cannot see the actual content of the data.
For those looking to enhance their mobile security, exploring comprehensive mobile privacy guides can aid in choosing a service that prioritizes these advanced protections.
Frequently Asked Questions
What is a LocalNet attack?
A LocalNet attack occurs when an attacker mimics a local Wi-Fi network and uses DHCP settings to force a device’s traffic to bypass its VPN tunnel, exposing plaintext data.
Why does “Force all apps” cause iOS update issues?
Due to bugs in Apple’s NetworkExtension framework, forcing all traffic into the tunnel can cause the networking stack to crash or “brick” during an app update, leading to a loop of failed updates and required reboots.
Is Android as vulnerable as iOS to these leaks?
Generally, no. Android is not vulnerable to TunnelVision because it does not implement DHCP option 121, which is required for that specific attack vector.
What is post-quantum encryption?
It is a type of encryption designed to be secure against the computing power of future quantum computers, ensuring long-term data privacy.
Want to stay ahead of the curve on digital privacy?
Join the conversation in the comments below or subscribe to our newsletter for the latest insights on securing your mobile devices!
