You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

IPAD OS 17 AIRPLAY CONNECTIVITY ISSUES USING PROTON VPN PLUS

IPAD OS 17.1.1 with Proton VPN Plus app doesn’t connect to Samsung smart TV with AirPlay. I previously used Surfshark VPN which does work so ther must be an issue in the Proton VPN app?


Any comments welcomed…

URU7100

Posted on Nov 10, 2023 3:04 AM

Reply
Question marked as Top-ranking reply

Posted on Nov 10, 2023 9:21 AM

Perhaps some context would be worthwhile...


A VPN connection can only protect traffic between the VPN Client and the VPN Gateway. If you are running your own Gateway, while the VPN is active (and a no-split-tunnel traffic policy is applied) all traffic to your Gateway will have protection of the VPN tunnel between these two endpoints.


If instead you are connecting to a commercial VPN Service, your VPN traffic will be protected as far as your VPN Provider's Gateway - where it will be delivered to (and traverse) the internet without benefit of the VPN. As such, when connecting to an untrusted public WiFi, all of your network traffic will be protected over the least-trustworthy public WiFi connection - but receive no additional protection from where your traffic exits the VPN at the Gateway.


It is when using untrusted WiFi networks that Commercial VPN Apps may have useful utility - but you must consider that your unencrypted data remains visible to the VPN Provider. Choose your Provider with care - as not all are themselves trustworthy.


Also consider that much of your network traffic is already encrypted, by default, using TLS/SSL. That said, there are some network protocols (such as DNS) that do not have benefit of encryption - and this traffic can be intercepted or maliciously manipulated. This risk can be mitigated using DoH, DoT or ODoH protocols.


DoH and DoT are natively supported by iOS/iPadOS, but are not exposed via iPad settings; to configure and use these protocols you will need to use a third-party App - such as DNSecure. ODoH is also natively supported - but is only available to iCloud+ subscribers using Apple's Private Relay function.

5 replies
Question marked as Top-ranking reply

Nov 10, 2023 9:21 AM in response to rossowheels

Perhaps some context would be worthwhile...


A VPN connection can only protect traffic between the VPN Client and the VPN Gateway. If you are running your own Gateway, while the VPN is active (and a no-split-tunnel traffic policy is applied) all traffic to your Gateway will have protection of the VPN tunnel between these two endpoints.


If instead you are connecting to a commercial VPN Service, your VPN traffic will be protected as far as your VPN Provider's Gateway - where it will be delivered to (and traverse) the internet without benefit of the VPN. As such, when connecting to an untrusted public WiFi, all of your network traffic will be protected over the least-trustworthy public WiFi connection - but receive no additional protection from where your traffic exits the VPN at the Gateway.


It is when using untrusted WiFi networks that Commercial VPN Apps may have useful utility - but you must consider that your unencrypted data remains visible to the VPN Provider. Choose your Provider with care - as not all are themselves trustworthy.


Also consider that much of your network traffic is already encrypted, by default, using TLS/SSL. That said, there are some network protocols (such as DNS) that do not have benefit of encryption - and this traffic can be intercepted or maliciously manipulated. This risk can be mitigated using DoH, DoT or ODoH protocols.


DoH and DoT are natively supported by iOS/iPadOS, but are not exposed via iPad settings; to configure and use these protocols you will need to use a third-party App - such as DNSecure. ODoH is also natively supported - but is only available to iCloud+ subscribers using Apple's Private Relay function.

Nov 10, 2023 3:27 AM in response to rossowheels

Unless your VPN is configured to permit split-tunnelling, all network traffic will be routed through the VPN connection - and will therefore prevent access to local network resources or services (e.g., local printers, AirPlay etc.) while the VPN is active.


As described, your Surfshark VPN client App permits split-tunnelling - while the Proton VPN App uses a more secure no-split-tunnel configuration. The different VPN Apps are evidently designed (or at least configured) with a different security target in mind.

Nov 10, 2023 8:36 AM in response to rossowheels

While VPNs have their place as one element of a security solution, they are not a security panacea. Unless you understand precisely what they can and can't protect and how they are configured - and importantly potential effects upon other system functionality - VPN Apps are perhaps best avoided.


If you have an active VPN, it has the capacity to negatively impact all WiFi and/or Cellular connections.

Nov 10, 2023 8:50 AM in response to LotusPilot

Thanks and the obvious question, is there a security panacea? The answer is probably not so what are we left with? Mitigating security risks as much as possible. Let’s face it, there is no such thing as an unbreakable safe if it has been designed by a human being. Maybe AI could design such a thing, however, AI would probably find a way to break in. Possibly quantum computers are the answer………..

IPAD OS 17 AIRPLAY CONNECTIVITY ISSUES USING PROTON VPN PLUS

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.