WebRTC deanonymizing Tor / VPN / Proxy users

anonymous

 

Software engineer Daniel Roesler recently discovered how the WebRTC implementation in Mozilla Firefox and Chrome expose your real WAN IP to the website you visit (deanonymizing).

The Tor Browser Bundle does currently block WebRTC by default (or at least the demo doesn’t work).

When I use Tor through the normal Firefox / Chrome, my real IP is getting exposed to the website.

How does the Tor Socksproxy (127.0.0.1) handle non-http request?

 

Leave a Reply

Your email address will not be published. Required fields are marked *