Android 16 VPN Bypass: Why Google’s ‘Won’t Fix’ Stance Matters for Your Privacy
For users who rely on a Virtual Private Network (VPN) to mask their identity and secure their data, the “Always-On VPN” and “Block connections without VPN” settings in Android have long been viewed as a hard guarantee. These features are designed to ensure that not a single packet of data leaves the device unless it’s inside the encrypted tunnel. However, a newly confirmed vulnerability in Android 16 has shattered that assumption.
A security researcher has revealed that Android 16 contains a bug that allows malicious apps to bypass these protections entirely. The most concerning part of the discovery isn’t just the leak itself, but Google’s response: the company has officially declined to patch the flaw.
The Technical Breakdown: How the Bypass Works
In a standard secure configuration, “Always-On VPN” ensures the connection is maintained, while “Block connections without VPN” acts as a kill switch, preventing any internet traffic if the VPN drops. These settings are critical for journalists, activists, and privacy-conscious users who cannot risk exposing their real IP address to the open web.
The vulnerability discovered by Yusef, a Zurich-based security researcher known on X as @cybaqkebm, demonstrates that these protections are not as reliable as they appear. According to a technical paper published by the researcher, Android 16 can still leak traffic outside of the protected VPN tunnel regardless of how strict the device’s configuration settings are. When this happens, the device’s real IP address becomes visible to the internet, opening the door for tracking and surveillance.
The Controversy: Google’s “Won’t Fix” Decision
The discovery of the bug led Yusef to report the issue through the Android Vulnerability Reward Program. In most cases, a leak that bypasses core security settings would be treated as a high-priority fix. Google, however, closed the issue and marked it as “Won’t Fix,” stating that the vulnerability falls outside of their established threat model.
This decision highlights a fundamental disconnect between Google’s internal security definitions and the expectations of power users. While Google may not view this specific bypass as a critical threat to the average consumer, for anyone using a VPN for anonymity, a leak of the real IP address is a total failure of the tool’s primary purpose.
The GrapheneOS Alternative
While Google has declined to address the flaw, the open-source community has stepped in. GrapheneOS, a privacy-and-security-focused Android fork, has already moved to close the loophole. By implementing its own fix, GrapheneOS has ensured that its users are protected from the VPN leak that persists in official Android 16 builds.
This move underscores a growing trend where third-party, hardened versions of Android provide the rigorous security guarantees that the stock OS fails to deliver.
Key Takeaways for Android Users
- The Risk: If you’re on Android 16, your real IP address may be exposed even if “Always-On VPN” and “Block connections without VPN” are enabled.
- The Scope: This is a system-level bug in Android 16; it affects all VPN apps regardless of the provider.
- The Official Stance: Google does not currently intend to patch this vulnerability.
- The Solution: Users seeking a guaranteed fix may need to look toward security-hardened operating systems like GrapheneOS.
FAQ: Android 16 VPN Leak
Does this affect my specific VPN provider?
Yes. Because the bug exists within the Android 16 operating system itself, it bypasses the VPN tunnel regardless of which app you use. Your VPN provider cannot fix a flaw that exists in the underlying OS.

Can I fix this in my settings?
No. The researcher confirmed that enabling “Always-On VPN” or “Block connections without VPN” does not prevent the leak in Android 16.
Is my data being stolen?
The primary issue is the exposure of your real IP address. While this doesn’t automatically give a hacker access to your files, it removes your anonymity and allows websites or malicious actors to track your physical location and identity.
Looking Ahead
Google’s refusal to patch this leak signals a shift in how the company views “privacy” versus “security.” While the OS may be secure from traditional malware, the failure to protect the VPN tunnel suggests that absolute anonymity is not a priority for the stock Android experience. As more users migrate toward privacy-centric alternatives, the pressure may mount on Google to redefine its threat model to include the needs of those for whom an IP leak is a critical failure.