WebRTC Security Lack - IP Leak

WebRTC Security Lack - IP Leak

You already know about the WebRTC protocol from our other articles. Today we are going to tell you about the critical vulnerability of WebRTC, which is causing IP leak. And, of course, you will learn how to avoid this IP leak.

WebRTC: what is it?

WebRTC stands for Web Real-Time Communication. As the name implies, this protocol is designed to exchange data, primarily multimedia, in real time. Also with its help, audio and video calls are being made. This is not just a plugin, in all major browsers it has long been part of the product.

What is the vulnerability of WebRTC? Is this protocol unsafe?

As often happens, everything came out of good intentions. The WebRTC protocol was made to ease the process of communication between users. For this, WebRTC uses STUN servers. STUN is an abbreviation for Session Traversal Utilities for NAT. Translating from a programmer's language to a relatively understandable standard user, this means that STUN servers convert home IP addresses to public ones. For this purpose, STUN servers store your IP address and provide it to software code written in JavaScript.

Even if you are not involved in network security, the essence of IP leaks in this system is probably clear for you. STUN servers provide your IP address to a JavaScript just upon the request. Moreover: if you have ever ‘exposed’ your real IP STUN to the server (for example, you accidentally forgot to turn on the VPN service), the server will remember it. And now any site that exploits this vulnerability of WebRTC for its own purposes can easily find out your real IP address.

What to do?

There are several solutions to the problem. They are not mutually exclusive.

The first way is to set up your home network in such a way that it does show ’your real IP’, but shows the ‘intermediate’ one. That is, to enter into the chain another link. The easiest way to do this is to connect a wireless router to the Ethernet cable at your home and connect to the VPN service from it. You can do this without even having the skills of a system administrator. Moreover, if you are a BroVPN user - just contact our technical support, and we will step by step tell you how to do it!

The second method is a properly configured browser. In 2018, Explorer and Safari did not use WebRTC, however, it is possible that this protocol will sooner or later appear in new versions. We will tell below about other browsers.


Google chrome

You will need an add-in, because now in this browser you cannot either disable WebRTC through the user-accessible toolkit. We recommend using the WebRTC Leak prevent or UBlock Origin add-on.

Mozilla firefox

In this browser, there are two solutions to the problem of IP leakage through WebRTC. The first is the NoScript plugin. The second is manual setting. Here it is possible. Type in the address bar about:config, and then in the line media.peerconnection.enabled set the value to “false”.


The WebRTC Leak prevent plug-in is also available for Opera. Just install this add-in, and the IP leak through WebRTC will be fixed.

Log In

Sign up BroVPN

Sign up BroVPN

Now connect

Perfect, you're registered!
Now login to app and connect to VPN.


Restore password for BroVPN

Reset password for BroVPN

Choose plan:


VPN supported by online community


Premium VPN

By pressing "Install" I accept terms of use


Open BroVPN-Setup.exe after download to start install process

Step 1 Arrow Step 2

BroVPN installing





Thanks! We'll contact you.