WebRTC IP Leak Test

WebRTC is a communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. WebRTC stands for “Web Real-Time Communication”. This basically allows for voice, video chat, and P2P sharing within the browser (real-time communication) without adding extra browser extensions.

Plugins like NoScript will prevent this, it's probably a good idea to block this protocol directly as well, just to be safe.

Note: This disables browser-based call functionality that is used for webapps like Discord, Hangouts, Jitsi, etc.

A WebRTC leak is when your external (public) IP address is exposed via your browser’s WebRTC functionality. This leak can de-anonymize you via WebRTC APIs, even if your VPN is working correctly.vacy.

As of this writing, users of Firefox, Chrome (and Chromium based browsers like Brave), Opera, and Microsoft Edge are most vulnerable to WebRTC leaks because these browsers have WebRTC enabled by default.

How to disable WebRTC in Firefox

  • Enter "about:config" in the Firefox address bar and press enter.
  • Press the button "Accept the Risk and Continue" or "I accept the risk".
  • Follow the instructions below:
  1. Enter "about:config" in the firefox address bar and press enter.
  2. Press the button "I'll be careful, I promise!"
  3. Search for "media.peerconnection.enabled"
  4. Double click the entry, the column "Value" should now be "false"
  5. Done. Do the WebRTC leak test again.

If you want to make sure every single WebRTC-related setting is really disabled change these settings:

  1. media.peerconnection.turn.disable = true
  2. media.peerconnection.use_document_iceservers = false
  3. media.peerconnection.video.enabled = false
  4. media.peerconnection.identity.timeout = 1

How to disable WebRTC in Chrome and Brave

WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension.

  1. uBlock Origin: choose "Prevent WebRTC from leaking local IP addresses" within the Settings
  2. WebRTC Leak Prevent
  3. WebRTC Network Limiter

Note: browser add-ons and extensions may not be 100% effective. Even with add-ons, the vulnerability still exists in the browser to reveal your true IP address with the right STUN code.

How to disable WebRTC in Safari

There’s no need to disable WebRTC in Safari. Safari’s permissions model is stricter than those of most browsers. By default, no IP addresses are made available to websites except the one you use to access the site. Therefore you shouldn’t need to take any additional action to prevent WebRTC leaks in Safari.

If you want you can double-check it by following the next steps:

  1. Choose "Preferences" under the Safari menu in your menu bar.
  2. Select the Advanced tab and check the "Show Develop menu in menu bar" box.
  3. Exit Preferences and open the Develop menu in your menu bar.
  4. In the drop-down menu, open the "WebRTC" submenu and ensure "Enable Legacy WebRTC API" is unchecked. If it's grayed out, even better.

How to disable WebRTC in Opera

To disable WebRTC in Opera, you’ll need to download the extension WebRTC Leak Prevent and follow these steps:

  1. Access the extension’s settings (View → Show Extensions → WebRTC Leak Prevent → Options)
  2. Choose “Disable non-proxied UDP (force proxy)” from the dropdown menu
  3. Click Apply settings