icon
icon
+
Leave a message

Any website can get your real IP address even if you use a VPN

Until that moment you think your IP address is anonymous when using a VPN..
Daniel Roesler, a computer security researcher working in Oakland, published a surprising demo. If you use a VPN (excluding CISCO) on Windows and you are surfing with Chrome or Firefox, your real IP can be discovered by any web site without you even knowing it.




want to try it, OK...First turn On your VPN

POST TO READ: Top 10 Best Free VPN

Now check your IP, you can use WHATISMYIP..
Your IP address was changed
Now click on THIS LINK
yes ... It's your your real IP address.
and this gap has not only know your public IP address but your Private IP address .

This is the story of a "loophole" WebRTC that broadcasts your IP, even behind a VPN

Problem, WebRTC has a "loophole" which can be quite annoying for those who use a VPN and want to hide their original IP address. It makes it possible for any website to find it, not to stop at one of the VPN, at least on Windows. Numerous media have reversed the case in recent days, citing in particular a prototype that had been put online via this repository Github.


This is due to the STUN protocol (Simple crossing UDP through NAT) developed by the Internet Engineering Task Force (IETF), which allows an application to know the actual IP address of the machine. It is used in VoIP type of customers as well as SIP. It is therefore not unusual that WebRTC retrieves this data, but what is more worrying is that this is done without the user being informed and without any confirmation is requested. But in fact, this has absolutely nothing new.

How to protect yourself from this vulnerability?

To be safe, you should block the WebRTC API in your browser. This is the development module that is used to query the STUN server that communicates your real IP. Block WebRTC can make available some applications that use it.

    *For protection on Chrome / Chromium / Opera, just install the following extension that disables           WebRTC: WebRTC Block.

    *To protect Firefox, type about: config in your browser address bar. Look for the                                   "media.peerconnection.enabled" parameter, right click on it and "reverse" (to pass it to false).

    *To protect Internet Explorer and Safari both browsers do not use WebRTC the source of the fault.       So you have nothing to do.

     *For protection on TOR Browser: default TOR Browser disables WebRTC. Again, no                            problems to report.

Remember that the best support for this blog is to like and share our articles!

For more news, subscribe to the blog or newsletter , also have a look at TwitterGoogle+ , Facebook and our youtube channel for other news.

ConversionConversion EmoticonEmoticon

:)
:(
=(
^_^
:D
=D
=)D
|o|
@@,
;)
:-bd
:-d
:p
:ng