FREEDOME VPN cannot prevent IP address leaking through WebRTC.
Web Real-Time Communication (WebRTC) is an application programming interface (API) that is widely used in various pluginless applications. These days virtually all web browsers support WebRTC.
WebRTC includes a method for the web server to request the local IP address through the user’s web browser or some other application. This way the server may obtain the original IP address of the user’s computer as long as the user’s browser or other application supports WebRTC.
A VPN solution, such as FREEDOME VPN or its competitors, can not disable WebRTC within the web browser. At best, we could inspect all JavaScript code coming from a web server and break the WebRTC code. However, if the web server is a TLS/SSL protected https server, all Javascript is encrypted while it is being downloaded from the web server to the browser and it is impossible for FREEDOME VPN to inspect that. The code may also be obfuscated or compressed, making it difficult to reliably detect WebRTC. Therefore, it is not technically possible to block WebRTC with FREEDOME VPN.
To prevent WebRTC IP address leakage, you must disable WebRTC in the web browser or other application using the WebRTC API. Unfortunately, this is not possible with all applications.
Here are some ways to disable WebRTC with Chrome and Firefox web browsers:
Chrome:
Use the official webrtc.org extension WebRTC Network Limiter: https://chrome.google.com/webstore/detail/webrtc-network-limiter/npeicpdbkakmehahjeeohfdhnlpdklia.
Alternatively, you can find settings to control WebRTC (among some other settings) by typing this in the location bar: chrome://flags/#disable-webrtc
Firefox:
Type “about: config” in the location bar and change the media.peerconnection.enabled setting to “false”.