There’s a new security hole which has been brought to light. Your IP address can be revealed through WebRTC. Can we trust it or not?
First of all you should realize that identification of your IP address by WebRTC is a drawback of the browser you use, not the services like VPN/Tor/Socks.
WebRTC is created by Google for file sharing without the need of either internal or external plugins. It implies not only browser’s access with WebRTC support to network environment, but also a possibility of identifying public and local IP address using the protocol STUN. It helps to set peer-to-peer connection (P2P) bypassing all types of NAT.
It is known that there’re several browsers where WebRTC is enabled by default: Chrome, Firefox, Opera. If you don’t want your IP address to be identified, you should disable the support as lame as it sounds.
As for Firefox:
- You should type “about:config” in address window and then press the button Enter;
- Type "media.peerconnection.enabled" in address bar and click twice changing the value field “False”.
As for Chrome and Opera:
Nowadays there’s no way for enabling WebRTC by means of the browser itself. But add-in programs can’t be recommended as efficiency of such programs may put at threat your system. So it will be better not to use such browsers till the developers create something more up-dated like Firefox.
As for Android in Chrome:
- It’s impossible to enable WebRTC though there’s such option in settings.
- If you need browser with enabled WebRTC for Android, we’d like to recommend you using Firefox for Android. Here you can make it enabled according to the instruction for Firefox.