Apple’s new Private Relay is leaking your original address through WebRTC January 23, 2022, 12:36:11 am Apple’s new Private Relay is leaking your original address through WebRTCQuoteQuoteIf you perform a test with Private Relay turned on at step Reflexive connectivity you’ll see your address from your ISP. If you connect through a virtual private network or proxy and try the test again then nothing is leaked. I have reported this bug to Apple. Just to be aware, for the users under us.Edit: workaround is to enable WebRTC Sockets Proxying under Experimental WebKit Features. However In-App Safari will still show the leaked address even when this is enabledhttps://test.webrtc.orghttps://old.reddit.com/r/privacy/comments/pd4y5m/apples_new_private_relay_is_leaking_your_original/https://archive.st/archive/2021/8/old.reddit.com/78ms/old.reddit.com/r/privacy/comments/pd4y5m/apples_new_private_relay_is_leaking_your_original/index.htmlhttps://web.archive.org/web/20210828180143/https://old.reddit.com/r/privacy/comments/pd4y5m/apples_new_private_relay_is_leaking_your_original/https://archive.is/sEegVhttps://www.macworld.com/article/348965/icloud-plus-private-relay-safari-vpn-ip-address-encryption-privacy.htmlhttps://9to5mac.com/2021/07/23/turn-on-off-icloud-private-relay-ios-15-iphone-ipad/https://appleinsider.com/articles/21/06/10/how-apple-icloud-private-relay-workshttps://www.theverge.com/22573519/apple-private-relay-icloud-plus-ios-15-ipados-macos-monterey-how-to