• WebRTC reveals home IP-address and location
• Steganos Online Shield VPN stays fully operative
• WebRTC protection activated with one click only
It was revealed earlier that Mozilla Firefox as well as Google’s Browser Chrome let out users’ real IP-addresses despite activated VPNs. Developer Daniel Roesler names the implementation of WebRTC as reason for this security flaw. With Steganos Online Shield VPN the VPN tunnel stays protected against WebRTC: Internet users can still cover up their real IP-addresses and locations by using the VPN-tool developed by German Software company Steganos.
WebRTC: A threat to the local network and IP-address safety
Steganos Online Shield VPN stays in full working order
The VPN-tool of Steganos offers an easy solution to block WebRTC in Google Chrome and Mozilla Firefox: The real IP-address stays hidden, because the route over the standard gateway during the VPN connection gets deleted. WebRTC-protection can be activated with only one click directly in the software’s settings. As long as the protection in Steganos Online Shield VPN is active, there is no possibility to log the real IP-address via WebRTC.
A test of your own connection can show its vulnerability
Every Internet user can find out if their VPN connection is secure within seconds. Therefore, a visit of the following website is recommended: https://diafygi.github.io/webrtc-ips/
A new version of Steganos Online Shield VPN for Android is now available.
Please to the Google Play store, to get the update. If you have activated automatic updates via Google Play, you should receive the new version soon.
- Android 5 ‘Lollipop’ compatibility
- New OpenVPN version