wave-squareHow WebRTC leakage works

How WebRTC works

  1. The site sends a regular TCP request from the browser (or anti-detect browser).

  2. The anti-fraud system responds and injects a script for a STUN request.

  3. The browser makes a STUN request over UDP, bypassing the proxy from the real address, since we remember that the proxy or anti-detect browser may not support UDP.

  4. If the IPs of the TCP connection and UDP differ — the user is exposed for using a proxy.

    The image and information taken from the article ZloyTeamarrow-up-right

Last updated

Was this helpful?