In recent news, you may have heard of a vulnerability that came to light in which a user’s local and/or public IP address can be made visible, even behind a VPN, with the use of WebRTC. We have had customers approach us about this, stating they have been affected. I want to first clarify that this isn’t an inherent issue with our network or VyprVPN. It is something that affects other VPN providers as well.
Google Chrome: Install either the ScriptSafe or WebRTC Block add-on from the Chrome Web Store.
Mozilla Firefox: Install the NoScript add-on or disable WebRTC by typing “about:config” in the address bar (no quotes), then press Enter and search for “media.peerconnection.enabled” (no quotes) and set it to “false.”
Internet Explorer and Safari do not have WebRTC enabled by default.
We will update this thread with additional information as it becomes available. If you need further assistance, feel free to respond here or submit a support request to our team: https://www.goldenfrog.com/support/contact
Golden Frog Support