Open nirazv opened 2 years ago
This feature would be pinnacle to anti-tracking. The most sophisticated fingerprinting services can detect if your browser explicitly disabled WebRTC versus the UDP traffic timing out or request failing. So I've resolved to just disable UDP traffic at the network interface level unless a feature like this is available.
Should this be fixed by https://github.com/ungoogled-software/ungoogled-chromium/pull/2359?
That request is related to setting the default behavior using features and settings already built into the webrtc system. This request is a whole other level, not supported by webrtc, ultra hacky. You'd need to rewrite webrtc ICE connection data on the fly to detect the IP string sent and rewrite it. Other browsers have done this like multi login, but they have a team of devs dedicated to hacks like this.
This is really important feature for us Multi login is pricy
Description
Force Chromium to Use Proxy IP Address in WebRTC instead of Public IP while using VPN
Who's implementing?
The problem
Browsers leaks Public IP through WebRTC protocols while routing traffics through browser specific proxies such as chrome vpn extensions. but using Native VPN Application (OS Specific) doesn't produce public ip through WebRTC.
How to overcome this problem and force chromium to use proxy IP instead of public IP for WebRTC communication.
Note- Blocking WebRTC from Browser does hide the public ip but many websites eg. google.com, godaddy.com treats you as a bot and blacklist you from using some of their services.
This issue is more related to browser fingerprinting than ungoogling stuffs..
No Extensions available to solve this problem till now but some of the automation tools such as Kameleo.com is able to do such things but those are pricy.
Possible solutions
Force chromium to use proxy ip through ICE Framework TURN/STUN signaling services
Alternatives
No response
Additional context
No response