Google Chrome and Firefox web browsers have carried out a technology that allows both the browsers to know the IP address of the Internet users, who are using VPN service. Daniel Roesler, the security researcher has revealed this information on a hosting site ‘Github’, where he describes the problem. The issue is mainly caused by WebRTC, an open source project developed by Google to offer real time communication (RTC) to the browsers.

Now, both the browsers have the support of WebRTC, where they forward ‘STUN requests’ to STUN servers. With the help of these requests, the IP address of the local and public VPN users are obtained using JavaScript.

Daniel Roesler has made a page especially to display the whole process of obtaining IP address through WebRTC. This is a major issue for VPN users mainly because they used to make the use of VPN to hide online identity. But, luckily, there is one solution to this problem. If VPN users don’t want to display their identity, then they can disable the WebRTC in Google Chrome and Mozilla Firebox browsers.

If you have Mozilla Firebox browser and want to disable WebRTC, you can do so by typing “about:config” in the address bar and then set “media.peerconnection.enabled” to false. And, if you are using Google Chrome browser, just type “chrome://flags/” in the address bar and then enable “Disable WebRTC device enumeration”. Another options you can opt for is to disable JavaScript.

Related Posts