Leak between private space and per-app split tunneling
The government has ordered Russian tech companies to spy on users and detect VPNs. Yandex discovered and is actively exploiting this vulnerability. This vulnerability puts all private servers of users at risk, potentially ending up on a blacklist.
More information here https://github.com/runetfreedom/per-app-split-bypass-poc
Almost all mobile clients based on xray/sing-box run a local socks5 proxy without authentication.
At the same time, per-app split tunneling is implemented using VpnService, which redirects traffic to tun2socks (or something similar). But if there is spyware on the user's device (for example, as part of a government application), nothing prevents it from connecting directly to this socks5 proxy, bypassing VpnService, and discovering the user's external IP address.
Leak between private space and per-app split tunneling
The government has ordered Russian tech companies to spy on users and detect VPNs. Yandex discovered and is actively exploiting this vulnerability. This vulnerability puts all private servers of users at risk, potentially ending up on a blacklist.
More information here https://github.com/runetfreedom/per-app-split-bypass-poc
Almost all mobile clients based on xray/sing-box run a local socks5 proxy without authentication.
At the same time, per-app split tunneling is implemented using VpnService, which redirects traffic to tun2socks (or something similar). But if there is spyware on the user's device (for example, as part of a government application), nothing prevents it from connecting directly to this socks5 proxy, bypassing VpnService, and discovering the user's external IP address.