WebRTC exposed IP addresses
Your browser is exposing IP addresses to sites that you visit.
Your browser is exposing IP addresses to sites that you visit.
Your private information may be compromised, even if you’re using a VPN.
WebRTC stands for Web-Real Time Communication. As the name suggests, this technology allows for real-time communication between browsers without requiring an intermediate server (after the connection has been already established). The benefits of WebRTC include:
Although WebRTC was originally developed by Google, many browsers support this technology, including Microsoft Edge, Mozilla Firefox, Opera, Google Chrome, and Safari. WebRTC is most notably recognized for its ability to enhance video and audio chats, but it is also a powerful tool for other applications, such as the transfer of data.
WebRTC is a powerful application. The problem, however, is that each device's public IP address must be revealed in order to establish communication. Simply put, it’s your IP address’s visibility that’s referred to as a WebRTC leak. Who does a WebRTC leak pose a threat to?
As mentioned above, the problem is that WebRTC must obtain your public IP address. That’s because your public IP address:
Websites have the ability to obtain information from browser finger-printing, cookies, and metadata when you visit their sites. This information combined with the data collected from your public IP address gives unauthorized parties the capability of creating an in-depth profile on you.
There are different routes in which WebRTC identifies your IP address by using Interactive Connectivity Establishment Protocol, also known as ICE. Let's take a look at two of methods and how they put your information at risk.
Host candidate discovery means that the ICE protocol allows browsers to obtain IP addresses by reading them off of your device. In most cases, IP addresses are hidden from both websites and STUN/TURN servers by firewalls.
The problem is this leaves the door open for malicious websites and other predators to trick your STUN/TURN servers or browser into revealing your IP address. The scary part is that this can happen without you having a clue.
STUN/TURN servers have two functions when it comes to WebRTC. These are:
It is the second function that puts your privacy at risk. STUN/TURN servers use similar methods as websites to obtain your IP information.
The first thing you need to know is that when you use the WebRTC leak checker you will see two classes of IP addresses:
Remember that discovery of your private IP address does not reveal identifying information about yourself and therefore does not pose a threat. It is your public IP address that you are concerned about protecting.
When you use a VPN, the sites you visit will see your VPN server’s IP address, which could be anywhere in the world, instead of your public IP address. For instance, let's say you live in California, but your VPN server is located in Maine. Your public IP address will show that your device is located in Maine, giving you anonymity and protecting your privacy.
If you are operating with a VPN and the leak checker picks up the VPN server's IP address, your public IP address is secure. If the leak checker detects your public IP address as opposed to the VPN server's IP address, your privacy is at risk to unauthorized third parties.
If you aren't using a VPN and the leak checker is able to obtain your public IP address then your privacy is at risk and available for predators to exploit.
There is an excellent chance that you are exposing yourself to risk if you are not using a VPN. If the WebRTC leak checker suggests that you have a leak, here are the 7 steps you can take to confirm whether or not you have a leak.
Browsers have the ability to store a wealth of information for long periods of time without your knowledge. If you are using a VPN now, your browser can still be tricked into revealing information that predates your VPN. Simply restoring your browser or deleting your history and cookies will not solve the problem. This is where TrueVPN comes into play.
Our dedicated engineers are constantly researching new avenues and scenarios for WebRTC leaks to occur. Once a vulnerability is identified, they quickly develop effective fixes to ensure your privacy is always protected. Please note that this stands for TrueVPN Windows, Android, iOS, and macOS apps, as well as browser extensions. We recommend always using the apps (or extensions) before attempting manual setup.
We understand the dangers that are lurking at every corner of the world wide web. Our team is dedicated to ensuring that you are able to harvest the benefits of everything the internet has to offer while being protected from the dangers.