Key Takeaways

  • WebRTC enables video chat within browsers (Zoom, Discord web).
  • It can reveal your True IP address even if you are using a VPN.
  • This is largely a Chrome/Firefox issue, not a VPN software issue.
  • You can disable it with browser extensions or in advanced settings.

You are using a VPN, but your real IP might still be visible through a browser loophole called WebRTC.

The Technology

WebRTC (Web Real-Time Communication) allows browsers to have video chats and P2P connections without installing plugins. It is the technology behind Google Meet, Discord Web, and Zoom Web.

The Glitch

To establish a direct, low-latency connection (essential for video), WebRTC needs to know your "true" IP addresses (both Local LAN IP and Public WAN IP). Sometimes, a malicious or tracking website can ask your browser for this list using STUN requests. If successful, your browser hands over your real IP address, bypassing your VPN tunnel entirely.

How to fix it?

You can disable WebRTC in most browsers via extensions (like uBlock Origin -> Prevent WebRTC from leaking local IP) or advanced settings (`media.peerconnection.enabled = false` in Firefox `about:config`).

Frequently Asked Questions (FAQ)

Does this affect the Tor Browser?
No. The Tor Browser creates a very strict environment where WebRTC is blocked by default to prevent exactly this kind of leak.
How do I test if I am leaking?
Connect to your VPN, then run our leak test below. If you see your ISP's real IP address instead of the VPN server's IP, you have a leak.

Are you vulnerable?
Run WebRTC Leak Test