WebRTC Protect Prevent WebRTC from leaking your private and public IP addresses
Support Development
PayPal ● 
Bitcoin Address: bc1qh7juzrxrawpr65elm4qs285m5rdhnhgsn7h2jf
 ● 
Lightning Address: [email protected]
Your Input Matters
Review
Advertisement
Screenshot
The "WebRTC Protect" extension allows you to control how your browser uses WebRTC capability. WebRTC is a technology that enables real-time communication over the internet. In a WebRTC communication, the client and server can determine each other's public and private IP addresses based on how WebRTC finds peers using STUN (Session Traversal Utilities for NAT) technology. The extension provides options to either disable WebRTC access using the "Disable non-proxied UDP" mode or limit WebRTC to the public interface to prevent peers from having access to your private IP address. By default, most browsers reveal both interfaces to improve communication quality. By using this extension, you are in control.

Features

FAQs

  1. What is "WebRTC Protect" extension and how does it work?

    The extension adds a button to your browser after you install it (in the extension bar). By default, the extension is turned on and fully blocks WebRTC access, which is the most secure and private mode. However, you may need to allow WebRTC for some websites to work. For example, a peer-to-peer chat client may use this technology for communication. In this case, click the toolbar button once to disable the extension. Even when the extension is disabled from the action button or options page, your private IP and interface will still be protected, and you can still use the peer-to-peer website. If a website has any issues even after taking these steps, go to the options page and change the disabled mode to "Use the default public interface and private interface." This change causes the extension to reveal your private and public IP addresses until the extension is enabled again.

  2. When using this extension, am I protected in the incognito mode?

    Enable the "Allow in incognito" checkbox in the extension's options page to ensure that incognito mode is covered. You can find this checkbox by going to your browser's extensions manager and opening the options page for this extension. To double-check that incognito support is enabled, refresh the options page. If the extension is protecting the incognito mode, you should see a green "Yes" message.

    Incognito mode is a private browsing mode that prevents your browsing history and searches history from being saved locally on your device. It also prevents cookies and site data from being stored, which can help to protect your privacy online. Please note that even with the extension enabled in incognito mode, your browsing activity in incognito mode may still be visible to your internet service provider or any third parties with access to your network traffic.

  3. Is it recommended to keep the extension enabled by default?

    It is generally recommended to keep the extension enabled by default. WebRTC access is blocked by default, which provides the most secure and private mode. If you encounter a website that has issues because it needs WebRTC access, you can disable the extension from the toolbar button. Once you are finished using that website, remember to turn the extension back on again. This will ensure that you are protected while browsing the web.

  4. How can I check if I have WebRTC leakage?

    WebRTC leakage refers to the unintended exposure of a user's IP address or other related identities when using WebRTC technology. This can occur when a user's web browser establishes a direct connection with another user's web browser, bypassing any proxy or VPN that the user may be used to mask their IP address. WebRTC leakage can expose a user's real IP address (private and public addresses). To check for WebRTC leakage, follow these steps:

    • Right-click on the toolbar button and select the "Check WebRTC Leakage" item.
    • Alternatively, open the following link in a new browser tab: webbrowsertools.com/ip-address/

    This will open a new webpage that will try to determine your private and public IP addresses by establishing a WebRTC connection. You should not see any IP addresses exposed if the extension is enabled. If the extension is disabled, you may see your public IP address or both public and private addresses, depending on your settings. Keep in mind that this webpage only checks for IP address leakage caused by WebRTC. Your public IP address may still be traceable even if you have no WebRTC leakage. It is recommended to use a proxy changer extension in addition to this extension to protect your IP address. One option is the Proxy Switcher extension, available at https://add0n.com/proxy-switcher.html.

  5. What's new in this version?

    Please check the Logs section.

  6. What is the meaning of the newly introduced "Disable WebRTC Media Device Enumeration API" option?

    The navigator.mediaDevices object is a part of the WebRTC API that provides access to media input and output devices such as microphones, cameras, and speakers. It allows web applications to access and control these devices to implement real-time communication functionality, such as video and audio streaming. The "Disable WebRTC Media Device Enumeration API" option allows users to disable this object in their web browser. This object has a method called enumerateDevices, which returns a list of available audio and video input devices. Each device is assigned a unique ID, which can potentially be used to track the user. The "WebRTC Protect" extension prevents this by returning an empty array when the protection is active. To allow WebRTC connections, simply disable the extension from the toolbar button. To completely disable the mediaDevices object, use the options page. To view a list of devices and their IDs, run the following code in the browser console:

    navigator.mediaDevices.enumerateDevices().then(MediaDeviceInfo => {
      console.log(MediaDeviceInfo);
    });

  7. Why is it important to prevent WebRTC from revealing my IP address?

    To prevent this from happening, you can use an extension to disable the WebRTC protocol completely or ask the browser to hide your private IP address. You can test your actual IP address after altering the settings using the https://webbrowsertools.com/ip-address/ website, which displays your IP address using several methods. Keep in mind that WebRTC can bypass SOCKS proxy communication, but it cannot bypass VPNs, as VPNs redirect traffic from your operating system rather than just your browser.

Matched Content

Reviews

Please keep reviews clean, avoid improper language, and do not post any personal information. Also, please consider sharing your valuable input on the official store.

What's new in this version

Version--
Published--/--/--
Change Logs:
    Last 10 commits on GitHub
    Hover over a node to see more details

    Need help?

    If you have questions about the extension, or ideas on how to improve it, please post them on the  support site. Don't forget to search through the bug reports first as most likely your question/bug report has already been reported or there is a workaround posted for it.

    Open IssuesIssuesForks

    Permissions are explained

    PermissionDescription
    storageTo save local preferences like enable or disable status
    privacyThe main module to ask your browser to disable WebRTC
    contextMenusTo add context-menu item to the toolbar icon (opens an online service to check WebRTC leakage)

    Recent Blog Posts