Leaked IP Addresses of VPN Users Reveal Online Vulnerability Again
Web Real Time Communication or WebRTC has recently discovered a critical online vulnerability that has once again shaken the World Wide Web.
This vulnerability reflected open-sourced standards which gave the browser capacity to make video and voice calls without the need for a plug-in.
What are the affected products?
Security researchers have discovered that the security flaw allowed the web owner to view the real IP address of users through WebRTC. This is true even for users who are using VPN or PureVPN, tools which are supposedly able to mask IP addresses.
This recently discovered online security crack is affecting WebRTC-supporting web browsers. The named affected browsers are Mozilla Firefox and Google Chrome. The study also appeared that the flaw is contained within the Windows operating systems only. The users of Mac OS X and Linux did not show any sign of being affected.
How does the WebRTC security flaw operate?
The Web Real-Time Communication enables requests to be made to Session Traversal Utilities or STUN servers. This will then yield the supposedly hidden IP address and even the local network address for the system which is being utilized by the user.
How to Check if You are Affected
Security glitches appear to be highly technical and troublesome, that’s why most people get overwhelmed with panic about its repercussions.
However, it is important to take control of the situation. First and foremost, double check if you are indeed affected by following these simple steps:
- Connect to the ExpressVPN network.
- Go to http://ipleak.net.
- If the browser is secure, users should be able to see a sign that says No leak
- If the browser is indeed affected, users should be able to see the details regarding their real IP address in the WebRTC area.
How to Get Yourself Protected
There are different means to get protected from this security crack.
For Google Chrome users:
- Google Chrome and other Chrome-based browser users can cover this vulnerability by installing the WebRTC Block extension. Another alternative would be to download ScriptSafe. Both have been found to block the vulnerability.
For Mozilla Firefox Users:
- Key in about:config in the address bar of the browser and hit enter
- Confirm that you will be cautious when the prompt appears
- Look out for media.peerconnection.enabled
- Double click on preference to set it up to False