WebRTC leak
Dear Helper :
I am using a VPN on Firefox for Android. I am running Firefox 95.2. ipleak.net shows that I have a webRTC leak. I have no access to 'about: config' anymore that I can use to correct this.
Can you please help me stop the webRTC leak ?
My thanks in advance.
Todas as respostas (8)
Hi
Are you able to share a copy of the report you are being provided with from that site?
Thanks for a speedy response Sebuto. Yes, in fact I do have a screen capture of ipleak.net's output.
But how do I make this available to you ? Email to ' do-not reply...' ?
Seburo, I tried to send you a screen shot by email. It bounced back. Below is a copy and paste of the bounced email instance.
On Tue, Jan 25, 2022, 12:28 AM Mail Delivery Subsystem <[email protected]> wrote: Error Icon Address not found Your message wasn't delivered to [email protected] because the address couldn't be found, or is unable to receive mail. LEARN MORE The response was: The email account that you tried to reach does not exist. Please try double-checking the recipient's email address for typos or unnecessary spaces. Learn more at https://support.google.com/mail/answer/6596
Hi,
I had to manipulate things a bit to get this image here. I hope it helps. Thanks.
I am providing as much info to help you as I can.
The IP Address 10.x.x.x, is a private, unroutable address that does not even belong to my service provider...
And this is the mildest of the crimes that these people are doing. I had to delete all app caches and reboot in order to post this. They had simply frozen the 'log in ' icon/button...as they block my communications with the Firefox/Mozilla Support Team. So that you will not know...
Hi
I am not sure what you mean by crimes. Have you granted Firefox for Android permission to audio and video on your device?
Hi:
1)Audio and video permissions are granted in appropriate programs. But I am not sure of the connection b/w granting video and audio permissions and webRTC leakage ? 2) By crimes I mean the multiple, dedicated and continuous efforts by the untraceable 10.x.x.x IP address to BREAK Firefox security features, including other non Firefox VPN installed. The VPN had been chosen to use a non-Eye country. But while superficially it LOOKED like it was connected to the selected country, opening the log showed a fast dynamic switch from an American server to the chosen country indicating that the UI was manipulated to show a connection to the chosen country which was infact used as a mask for an American server... 3) You dont wanna know the rest... 4) These are what I mean by crimes...
Anyway, is there a way I can stop the webRTC leakage on Andtoid or not ?