VPN users beware: Firefox and Chrome have a security vulnerability that may leak your IP address unless you’re using a full-featured VPN like NordVPN. Read on to find out what a WebRTC leak is and how you can protect yourself from vulnerability.
A WebRTC leak is a vulnerability that can occur in web browsers like Firefox, Google Chrome, Brave, Opera, and others. A WebRTC leak presents a major security risk, as it can can expose your real IP address when you’re connected to a subpar VPN that doesn’t protect you against WebRTC leaks.
WebRTC (Web Real-Time Communication) is an open-source tool that allows browsers to form real-time peer-to-peer connections with the websites they visit.
This allows your Firefox browser, for example, to send live audio and video feeds back and forth between you and another participant online without having to download any additional software. This is a non-proprietary protocol that allows any website to plug in and make such a connection (with your permission).
WebRTC does this by establishing special communication channels from the browser. They communicate with the website you’re visiting and exchange information (including your IP address). Those channels, however, may also bypass your encrypted tunnel.
WebRTC presents a massive vulnerability. Any website you visit can potentially request and access your true IP address despite your VPN. When this vulnerability was first discovered, it gave VPN providers (ourselves included) quite a scare. The worst part is that this is part of the basic functionality of WebRTC, so it can’t be “fixed.” It’s up to the user to find ways to block these leaks or disable WebRTC entirely.
Check your VPN for any potential WebRTC leaks, by following these simple steps:
Note: your original IP usually begins with 10.xxx or 192.xxx or sometimes an alpha-numeric IPv6).
There are a few ways to do this. By far the simplest way is to block WebRTC leaks by using NordVPN. Whether you’re using our regular VPN or our browser plugins for Firefox or Chrome, either will block any unwanted IP address leaks through WebRTC while allowing authorized WebRTC connections to continue under your anonymous IP address.
WebRTC requests can also be blocked from your browser, but this process will be a bit more complicated. Furthermore, unlike with NordVPN, blocking WebRTC leaks using these methods will often disable WebRTC functionality completely.
Disabling WebRTC on Chrome is tricky, and we strongly suggest using an extension to do so. That’s because the extension-free way involves manually editing setting files that can potentially make your Chrome browser malfunction if you do it wrong.
WebRTC Leak Prevent is the leading Chrome extension for preventing WebRTC leaks. As the developer has noted, this extension only changes WebRTC’s security and privacy settings – it doesn’t turn WebRTC off.
Fortunately, Firefox does have a built-in way to disable WebRTC. It can be hard to find if you don’t know where to look, so follow these steps!
That’s it! This will disable all WebRTC, so it will also disable any websites that use it to deliver their services.
Disabling WebRTC on Safari is possible, but the option is a bit harder to find than on Firefox. That’s because WebRTC was only recently implemented, and is still considered an experimental feature that only developers would want to fiddle with. If you follow these instructions, however, you’ll find it easily!
That’s it! Your Safari is now free of WebRTC leaks. However, this may also prevent WebRTC-based services from working in your browser.
Blocking WebRTC leaks is a good start to securing your online activity, but it’s not enough. If you use NordVPN’s browser extension or VPN service to block these leaks, you’ll already have a collection of tools at your disposal to help secure yourself, including CyberSec and Onion over VPN. However, you’ll also want to read about our other tips on how to stay private and secure.
For more cybersecurity tips and tricks, sign up for our monthly blog newsletter below!