搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

Learn More

话题已关闭并存档。 如果需要帮助请提出新问题。

WebRTC - IP Security leak with VPN

  • 4 个回答
  • 1 人有此问题
  • 8 次查看
  • 最后回复者为 John99

more options

Can someone please tell me that this security issue is being worked on? This is a serious problem. I don't know anything about programming but from what I have read, plugin developers are being forced to use WebRTC webextensions. But the issue is, WebRTC has a serious leak of exposing your IP when using VPN. Totally unacceptable and I can't believe Mozilla is ok with this. Us users need the ability to use both VPN and our plugins to defeat tracking and keep secured. Does any one have information about this high risk issue?

Can someone please tell me that this security issue is being worked on? This is a serious problem. I don't know anything about programming but from what I have read, plugin developers are being forced to use WebRTC webextensions. But the issue is, WebRTC has a serious leak of exposing your IP when using VPN. Totally unacceptable and I can't believe Mozilla is ok with this. Us users need the ability to use both VPN and our plugins to defeat tracking and keep secured. Does any one have information about this high risk issue?

所有回复 (4)

more options

Hello ice_blue, unfortunately, mozilla will still support the underlying webrtc technology in the browser, even after Hello discontinued in Firefox 49.

please see : https://wiki.mozilla.org/Media/WebRTC/Privacy

from what i known, the vpn that is not affected by WebRTC, are : HotSpot Shield, IPVanish, CyberGhost, StrongVPN, ExpressVPN.

thank you

more options

Thanks for your reply ideato. I bookmarked the link.

ideato said

from what i known, the vpn that is not affected by WebRTC, are : HotSpot Shield, IPVanish, CyberGhost, StrongVPN, ExpressVPN.

It looks like you're saying that the IP exposure is the fault of the VPN provider and not Firefox. Do you have a link to a resource site to confirm this?

more options

Hello

ice_blue said

It looks like you're saying that the IP exposure is the fault of the VPN provider and not Firefox. Do you have a link to a resource site to confirm this?

No, the ip exposure is "fault" (not exactly the correct word) in firefox, edge, chrome and opera browsers that use technology like Firefox Hello (Web Real-Time Communication or WebRTC), this technology is not mature yet.

yes i have a link but it is in Greek language :-)

https://www.pcsteps.gr/109541-%CF%84%CE%BF-%CF%80%CE%B9%CE%BF-%CF%83%CF%84%CE%B1%CE%B8%CE%B5%CF%81%CF%8C-%CE%B3%CF%81%CE%AE%CE%B3%CE%BF%CF%81%CE%BF-vpn-%CF%83%CF%84%CE%B7%CE%BD-%CE%B5%CE%BB%CE%BB%CE%AC%CE%B4%CE%B1/

the above vpn providers use different technology than the others and because of that, does not affected by WebRTC.

see the screenshots

Υπέρ, means, Pros : Δεν επηρεάζεται από το WebRTC, means Does not affected by WebRTC

Κατά, means, Cons : Επηρεάζεται από το WebRTC, means, Affected by WebRTC

thanks again

more options

It is probably better to keep this to the original thread. Thanks for cross linking them Ideato.

It is also worth noting you are not forced to use WebRTC you are able to disable it.

We do not have Developers and security experts here. If you consider there is an unadressed security issue then you would be better asking in the Mozilla security forum.