What is WebRTC?
A browser technology for real-time communication (video calls, file sharing) that can accidentally reveal your real IP address even when using a VPN.
WebRTC (Web Real-Time Communication) enables peer-to-peer communication directly in the browser, but its IP discovery mechanism is a privacy risk.
How WebRTC Leaks Your IP
- WebRTC needs to discover your network interfaces to establish peer connections
- It uses STUN servers to find your public IP
- This happens at the browser level, bypassing VPN routing
- Your real IP can be exposed even with an active VPN
How to Check
- Use Default Privacy's Exposed tool (/exposed) to check for WebRTC leaks
- BrowserLeaks.com has a dedicated WebRTC test
How to Fix
- Firefox: Set
media.peerconnection.enabledto false in about:config - Brave: Disables WebRTC leaks by default
- Chrome: Requires an extension (WebRTC Leak Prevent)
- uBlock Origin: Has a WebRTC leak prevention option
Trade-offs
Disabling WebRTC breaks video calling in the browser (Google Meet, Jitsi). If you need browser-based video calls, use a browser profile with WebRTC enabled and your VPN carefully configured.
Related Terms
Browser Fingerprinting
A tracking technique that collects information about your browser, device, and settings to create a unique identifier. Unlike cookies, fingerprints are nearly impossible to delete and can track you across websites without your knowledge or consent.
Virtual Private Network
A technology that creates a secure, encrypted connection over a less secure network, such as the public internet. VPNs mask your IP address, encrypt your internet traffic, and can make it appear as though you're browsing from a different location.
WebRTC Leak
A browser vulnerability where WebRTC (used for video calls and peer-to-peer communication) reveals your real IP address even when using a VPN, because WebRTC can access your network interfaces directly.
Have more questions?
Use our guided flow to get the right next privacy step for WebRTC.
Open Guided Flow