Prevent IP Address Leaks At Google Chrome And Mozilla Firefox
Updated on July 13, 2021: From now on, traffic filtering, malware protection, and suspicious DNS activity blocking are available as a part of the separate DNS Firewall app.
Ever faced a situation when, even though a VPN or proxy was on, your real location still got detected and access blocked? Annoying, isn’t it? Surely some websites do imply enhanced blocking techniques that not every VPN provider manages to overcome. But do not worry, this may not be the case. Check if your real IP is not leaking via WebRTC first. What is it? We’ll shed some light on the issue and show you how to protect yourself.
What is WebRTC?
The term ‘WebRTC’ stands for Web Real-Time Communication, a technology that provides browsers and mobile applications with RTC capabilities via simple APIs (Application Programming Interfaces). To put it simply, it was developed to help establish connection between browsers and surpass the need for additional plugins. Sounds like quite a useful technology, and it really is. But wha is on the other side of the coin?
Despite its obvious benefits, WebRTC also brings a major security vulnerability. It can potentially reveal user’s local and public IP address even though VPN is in use. So, if you take care of online privacy or strive to bypass geo-restrictions, make sure to take the following precautions.
More on WebRTC Danger
Customers’ reports and recent research have shown this new security vulnerability affecting Chrome and Firefox web browsers. Now, websites can perform a new form of IP check, which allows them to identify users’ actual ISP-issued IP address even if they are using VPN! How is it done?
- A WebRTC JavaScript code is used in the visitor’s browser.
- WebRTC JavaScript is executed behind the scenes without users knowing about it to get users’ IP.
One of the main goals of a VPN client is to conceal the user’s IP by providing a random one, often of another country. Many security experts agree that the problem is not in the flaw itself (as this issue is just a consequence of the new communication protocol) but in the fact that millions of users will go without knowing about it. We suggest you take a moment to check your system, run a test and fix it.
Keep in mind that not only Windows users are affected. This also concerns macOS and Android users who use Google Chrome and Mozilla Firefox browsers.
How to Run a WebRTC Leak Test
It is very simple. Just use a service like IPLeak to run a test for WebRTC local IP leak and check if your system is vulnerable. If, in spite of an active VPN connection you see your real IP, you may need to take extra measures to patch WebRTC holes in your browsers.
VPN Chrome extension
A great solution would be to install a reliable VPN extension with a built-in WebRTC Leak Prevent feature, like that of VPN Unlimited. It can be enabled in the settings as shown on the screenshot.
Our VPN app for Chrome encrypts your browser traffic, making all your browsing activities secure and private.
VPN Mozilla plugin
Mozilla Firefox users can employ the same tool and download Mozilla VPN extension. Free 7-day trial is available, so you can check out the service yourself before getting the desired subscription plan, in case you don’t have one yet.
Obviously, this VPN Mozilla plugin also includes WebRTC Leak Prevent feature to guarantee your online privacy. Just make sure it is enabled in the extension settings.
Alternatively, if you don’t want to install any extensions on your Mozilla Firefox browser, you could do the following:
- Type in “about:config” in the URL bar and press Enter.
- Do a search for “media.peerconnection.enabled”.
- Double click the option by setting it to “false”.
Though the above change of configuration will disable WebRTC, you’ll still need an active connection to a VPN server to have your real IP hidden.
Have any questions or wish to share your feedback? You’re welcome to leave your comments below!