GrapheneOS has released a new update that fixes a recently disclosed Android VPN bypass vulnerability capable of leaking a user’s real IP address.
The leak happens even when Android’s “Always-On VPN” and “Block connections without VPN” protections were enabled.
The issue, disclosed last week by security researcher “lowlevel/Yusuf,” affected Android 16 and stemmed from a newly introduced QUIC connection teardown feature in Android’s networking stack.
➡️ Read the full article at Hacker News
This excerpt is provided for informational purposes with a link to the original source. All rights belong to the original publisher.
As an Amazon Associate, we earn from qualifying purchases at no extra cost to you.
