Preventing real IP address leakage over WebRTC

WebRTC is an API definition that supports browser-to-browser applications for voice calling, video chat, and P2P file sharing. It's enabled by default in Firefox and Chrome. It could be a reason of real IP address leakage.

At it's available to know the public IP addresses that are able to got over WebRTC.


  • Enter "about:config" in the address bar
  • Press the button "I'll be careful, I promise!"
  • Search for "media.peerconnection.enabled"
  • Double click the entry to set the column "Value" to "false"
With add-ons

Use WebRTC Leak Shield to activate/deactivate WebRTC support with a simple button. Or uBlock Origin with the checked option "Prevent WebRTC from leaking local IP addresses".

With add-ons for advanced users

Advanced users can use NoScript (requires technical knowledge to configure) or uMatrix add-ons to create rules based on domain name, type of element and type of resource being requested.

Chrome on Desktop

At this time there is no way to disable WebRTC support in Chrome totally. But with WebRTC Network Limiter extension it's available to disable WebRTC Multiple Routes, that helps to use only default gateway for connections. Set "Use only my default public IP address" in the extenstion's settings.

Advanced users also can use Script Safe (like NoScript for Firefox) to block unwanted elements (like scripts, frames and etc.) for preventing IP address leakage.

Remember that full disabling WebRTC support may break some web services' functionality (e.g. video and audio chats).

show comments