No WebRTC leaks detected
Surfshark is protecting you from WebRTC leaks.
Surfshark is protecting you from WebRTC leaks.
Your private information may be compromised, even if you’re using a VPN.
WebRTC is a technology needed so that video chat and voice applications like Google Hangouts or Discord could work better and run faster on browsers.
WebRTC stands for Web Real-Time Communication. As the name suggests, this technology allows for real-time communication between browsers without requiring an intermediate server (after the connection has been already established). The benefits of WebRTC include:
Although WebRTC was originally developed by Google, many browsers support this technology, including Microsoft Edge, Mozilla Firefox, Opera, Google Chrome, and Safari.
WebRTC is most notably recognized for its ability to enhance video and audio chats, but it is also a useful tool for other applications, such as the transfer of data.
A WebRTC leak is the visibility of an IP address, which can pose a big security risk for an end-user. WebRTC leaks take place when you’re trying to establish video or audio communication with another person via a browser that uses WebRTC technology. A browser then reveals your IP address – that’s why it’s called a leak.
As long as WebRTC is turned on in your browser and you’re on a website that uses it, your real IP address will be visible, and, therefore, it will be leaking. The only way to avoid a WebRTC leak is to turn it off in your browser (more on how to do this later).
A WebRTC leak poses a threat to anyone who is using a VPN (virtual private network) or just prefers to keep their online identity anonymous. Having a VPN while using services with WebRTC technology kind of defeats the purpose of a VPN. The problem lies in a browser more so than a VPN - as you’ll learn later, Safari is quite safe when it comes to WebRTC leaks.
To test whether your browser is leaking your IP address, use any online WebRTC leak checker (there is also one at the top of this page). If the WebRTC leak checker suggests that you have a leak, here are the 6 steps you can take to confirm whether or not that’s 100% true.
You can disable some of the functionality of WebRTC in your browser’s settings. In the following sections, you’ll see how to do it on Google Chrome, Safari, and Firefox.
It’s best to use an extension to disable WebRTC on Chrome because doing it manually can cause damage to the functionality of your browser. Here are a couple of extensions you could use:
Safari takes care of WebRTC leaks better than other browsers by blocking websites from accessing your camera and microphone by default. However, you can still disable it from the browser to be extra careful.
1. Go to Safari > Preferences. Check “Show Develop menu in menu bar”.
2. You’ll see a new section called Develop in the top menu bar.
3. Select WebRTC and then click Disable ICE Candidate Restrictions.
You’re now protected from WebRTC leaks!
You can disable WebRTC in the browser settings by following these steps:
1. Type this in the URL bar and click Enter: about:config
2. Click “Accept the Risk and Continue”.
3. Click “Show All”.
4. You’ll see this window with a list of various settings. Better not to change them.
5. Type this in the search bar: media.peerconnection.enabled
6. Click the button on the right (I marked it in the screenshot below). It should now say “false”.
And you’re done! You’ve successfully disabled WebRTC on Firefox.
Browsers have the ability to store a wealth of information for long periods of time without your knowledge. Simply restoring your browser or deleting your history and cookies will not solve the problem. This is where Surfshark comes into play.
Our dedicated engineers are constantly researching new avenues and scenarios for WebRTC leaks to occur. Once a vulnerability is identified, they quickly develop effective fixes to ensure your privacy is always protected.