Firefox
- Open a new tab and go to
about:config. Accept the warning. - Search for
media.peerconnection.enabled. - Toggle it to
false.
That fully disables WebRTC. Voice/video calls in browser-based apps will stop working until you flip it back.
Troubleshooting
What WebRTC is, why it can leak your real IP, and how to stop it browser by browser.
WebRTC (Web Real-Time Communication) is a set of browser APIs that lets web pages do peer-to-peer voice, video, and data without an extension. It powers Google Meet, Discord voice channels, the in-browser bits of Zoom, Jitsi, Whereby, and most "click to talk" web apps.
To set up a peer connection, the browser needs to know your public IP — that's how the other side reaches you. WebRTC discovers it by asking a STUN server. Once it knows the address, the browser can offer it to any page that asks via the WebRTC API.
A WebRTC leak is when a page silently triggers that STUN lookup and the browser hands back your real public IP instead of the VPN's. With a couple of lines of JavaScript any site can do this in the background — no prompt, no user action — and learn your real address even while you're behind a VPN.
This is a browser-level leak, not a VPN-level leak. Traffic is still routed through the tunnel for normal HTTP, but WebRTC's STUN request operates above the tunnel: the browser already knows the answer locally and just tells the page.
Run the in-browser tester while the VPN is connected:
fexyn.com/tools/webrtc-leak-test
The page asks the browser for any IPs it would surface to a WebRTC peer and shows them. Two things to look for:
192.168.x.x or 10.x.x.x. These are addresses on your home network. They're a minor privacy concern (they hint at your network topology) but they don't identify you on the internet.about:config. Accept the warning.media.peerconnection.enabled.false.That fully disables WebRTC. Voice/video calls in browser-based apps will stop working until you flip it back.
This is the strongest setting that doesn't fully break WebRTC. Calls still work; only the IP discovery step is restricted to the proxy.
Neither has a built-in WebRTC toggle. Install one of the established privacy extensions (uBlock Origin's "Prevent WebRTC from leaking local IP addresses" option, or a dedicated extension like "WebRTC Network Limiter" published by Google). Pick from the official Chrome Web Store / Edge Add-ons store; avoid random one-star extensions claiming to "fix WebRTC".
As an alternative, switch the workflow to Brave or Firefox where the toggle is built in.
These are different problems with different fixes:
If both are leaking, fix the tunnel first — the VPN-side fix is faster and rules out the harder browser configuration as the cause.
After applying the browser change, restart the browser and rerun the test. The public IP shown should now match the Fexyn server, and the local IP either should be empty or show only the address of the VPN tunnel adapter.
Fexyn does not log browsing history, DNS queries, or traffic content (see the no-logs policy). A WebRTC leak doesn't change anything we collect on our side — the leak goes from your browser straight to whoever's page you're on. They get your real IP, we don't.
WebRTC leak fixes are browser-side, so support can't change behavior on your machine remotely. We can help you confirm the test result and pick the right browser setting if you're stuck. Email support@fexyn.com with the browser name and version and the test result page URL.
Re-test after applying the browser fix.