Chrome – Tunnel WebRTC UDP traffic through proxy

A user’s IP address is typically leaked by WebRTC, even when using a proxy. This is a big deal for security, but not why I’m interested. Some sites, like www.omegle.com, create video chats based off WebRTC. Unfortunately, they’re acting in bad faith, using WebRTC to detect your real IP address outside of the VPN tunnel and then blocking users with proxied connections by comparing your leaked, real IP with the fake one supplied by regular HTTP requests.

My question is, in Chrome, is it possible to spoof the IP address that WebRTC “discovers”, either through browser modifications or injectable javascript?

My goal is NOT to disable WebRTC but to modify the IP that it discovers to match what the proxy gives the remote server.

Example test site: www.expressvpn.com/webrtc-leak-test

I see in Chrome that there are a number of options for internal settings:

chrome.privacy.IPHandlingPolicy.DEFAULT
chrome.privacy.IPHandlingPolicy.DEFAULT_PUBLIC_AND_PRIVATE_INTERFACES
chrome.privacy.IPHandlingPolicy.DEFAULT_PUBLIC_INTERFACE_ONLY
chrome.privacy.IPHandlingPolicy.DISABLE_NON_PROXIED_UDP

…but nothing for proxying that UDP traffic. Any help would be appreciated!

Read more here: Source link