Ko tenda hembiapoite sa’ivéta oñemba’apokuévo hese hembiapo porãve hag̃ua. Peteĩ jehaipyre nomoĩporãiramo ne apañuái ha eporanduséramo, roguerekohína ore nepytyvõ rekoha ikatútava ndeykeko @FirefoxSupport Twitter-pe ha avei /r/firefox Reddit-pe.

Eheka Pytyvõha

Emboyke pytyvõha apovai. Ndorojeruremo’ãi ehenói térã eñe’ẽmondóvo pumbyrýpe ha emoherakuãvo marandu nemba’etéva. Emombe’u tembiapo imarãkuaáva ko “Marandu iñañáva” rupive.

Kuaave

WebRTC leak

  • 8 Mbohovái
  • 1 oguereko ko apañuái
  • 1 Hecha
  • Mbohovái ipaháva TyDraniu

more options

Dear Helper :

I am using a VPN on Firefox for Android. I am running Firefox 95.2. ipleak.net shows that I have a webRTC leak. I have no access to 'about: config' anymore that I can use to correct this.

Can you please help me stop the webRTC leak ?

My thanks in advance.

Dear Helper : I am using a VPN on Firefox for Android. I am running Firefox 95.2. ipleak.net shows that I have a webRTC leak. I have no access to 'about: config' anymore that I can use to correct this. Can you please help me stop the webRTC leak ? My thanks in advance.

Opaite Mbohovái (8)

more options

Hi

Are you able to share a copy of the report you are being provided with from that site?

more options

Thanks for a speedy response Sebuto. Yes, in fact I do have a screen capture of ipleak.net's output.

But how do I make this available to you ? Email to ' do-not reply...' ?

more options

Seburo, I tried to send you a screen shot by email. It bounced back. Below is a copy and paste of the bounced email instance.


On Tue, Jan 25, 2022, 12:28 AM Mail Delivery Subsystem <mailer-daemon@googlemail.com> wrote: Error Icon Address not found Your message wasn't delivered to no-reply@mozilla.org because the address couldn't be found, or is unable to receive mail. LEARN MORE The response was: The email account that you tried to reach does not exist. Please try double-checking the recipient's email address for typos or unnecessary spaces. Learn more at https://support.google.com/mail/answer/6596

more options

Hi,

I had to manipulate things a bit to get this image here. I hope it helps. Thanks.

more options

I am providing as much info to help you as I can.

The IP Address 10.x.x.x, is a private, unroutable address that does not even belong to my service provider...

And this is the mildest of the crimes that these people are doing. I had to delete all app caches and reboot in order to post this. They had simply frozen the 'log in ' icon/button...as they block my communications with the Firefox/Mozilla Support Team. So that you will not know...

more options

Hi

I am not sure what you mean by crimes. Have you granted Firefox for Android permission to audio and video on your device?

more options

Hi:

1)Audio and video permissions are granted in appropriate programs. But I am not sure of the connection b/w granting video and audio permissions and webRTC leakage ? 2) By crimes I mean the multiple, dedicated and continuous efforts by the untraceable 10.x.x.x IP address to BREAK Firefox security features, including other non Firefox VPN installed. The VPN had been chosen to use a non-Eye country. But while superficially it LOOKED like it was connected to the selected country, opening the log showed a fast dynamic switch from an American server to the chosen country indicating that the UI was manipulated to show a connection to the chosen country which was infact used as a mask for an American server... 3) You dont wanna know the rest... 4) These are what I mean by crimes...

Anyway, is there a way I can stop the webRTC leakage on Andtoid or not ?

more options

pburhanji said

Anyway, is there a way I can stop the webRTC leakage on Andtoid or not ?

Only in the Nightly version.