With many people working from home, web conferencing is insanely popular these days. And who can deny that having the ability to conference directly from a browser is awfully convenient.
Unfortunately, that convenience comes at a price (doesn't it always?). In this case, it means that browsers have opened a little known back door that can reveal your true IP address, even through a VPN.
You can test to see if WebRTC is revealing your IP address with this site:
The good news is that you can close this backdoor pretty easily in Firefox. Here's how:
1. Type "about:config" in the browser URL bar
2. You may see a screen that reads, "Proceed with Caution". Accept this and continue.
3. Type "media.peerconnection.enabled" in the search field at the top of the screen:
4. Double click the field to set it to "false".
Blocking WebRTC in Chrome is much harder because the setting is not exposed to users.
One solution is to download the free WebRTC Leak Prevent extension for Chrome. Another convenient - albeit not free - method is to use Winston. Our extension integrates seamlessly with our hardware device and blocks thousands of WebRTC detection scripts without breaking your favorite web conferencing service (Google Meets, Zoom, GotoMeeting all work fine with Winston).
Why not block WebRTC directly? You can. It may break some web conferencing services so for now (pending further testing), it can be turned off on our extension's "options" page: