WebRTC (Web Real-Time Communication) is a browser API that enables video calls, voice chats, and peer-to-peer file sharing directly in the browser without plugins. To establish peer-to-peer connections, WebRTC needs to discover your IP addresses - and it does so in a way that can bypass your VPN, exposing your real IP.
How WebRTC Leaks Your IP
WebRTC uses a protocol called ICE (Interactive Connectivity Establishment) to find the best path between two peers. As part of this process, it collects all available IP addresses from your device, including your real public IP, even if traffic is routed through a VPN. Websites can query this data using JavaScript.
Which Browsers Are Affected
| Browser | WebRTC Enabled by Default | Can Be Disabled |
|---|---|---|
| Chrome | Yes | Via extension |
| Firefox | Yes | Via about:config |
| Edge | Yes | Via extension |
| Safari | Yes (limited) | Rarely leaks due to Apple's implementation |
| Brave | Yes (fingerprint-resistant) | Has built-in WebRTC protection |
How to Fix a WebRTC Leak
- Firefox - Type
about:configin the address bar, findmedia.peerconnection.enabled, and set it tofalse. - Chrome / Edge - Install a WebRTC blocking extension such as "WebRTC Leak Prevent" or "uBlock Origin" (which can also block WebRTC).
- Brave - Go to Settings > Privacy > WebRTC IP handling policy > Select "Disable non-proxied UDP".
- Use a VPN with built-in WebRTC protection - Some VPN clients patch the browser or OS to prevent WebRTC from exposing the real IP.
People Also Ask
- What exactly is a WebRTC leak?
- It is when your browser exposes your real IP address through the WebRTC API while you are connected to a VPN, because WebRTC bypasses the VPN tunnel for peer-to-peer communication.
- How to fix WebRTC IP leakage?
- Disable WebRTC in your browser settings (Firefox) or install a blocking extension (Chrome/Edge). Test the fix with our VPN Leak Test.
Related: DNS leaks | VPN leaks | Test your VPN