Skip to main content
Topic: Apple’s new Private Relay is leaking your original address through WebRTC (Read 2189 times) previous topic - next topic

Apple’s new Private Relay is leaking your original address through WebRTC

Apple’s new Private Relay is leaking your original address through WebRTC

Quote
Quote
If you perform a test with Private Relay turned on at step Reflexive connectivity you’ll see your address from your ISP. If you connect through a virtual private network or proxy and try the test again then nothing is leaked. I have reported this bug to Apple. Just to be aware, for the users under us.

Edit: workaround is to enable WebRTC Sockets Proxying under Experimental WebKit Features. However In-App Safari will still show the leaked address even when this is enabled
https://test.webrtc.org

https://old.reddit.com/r/privacy/comments/pd4y5m/apples_new_private_relay_is_leaking_your_original/

https://archive.st/archive/2021/8/old.reddit.com/78ms/old.reddit.com/r/privacy/comments/pd4y5m/apples_new_private_relay_is_leaking_your_original/index.html

https://web.archive.org/web/20210828180143/https://old.reddit.com/r/privacy/comments/pd4y5m/apples_new_private_relay_is_leaking_your_original/

https://archive.is/sEegV


https://www.macworld.com/article/348965/icloud-plus-private-relay-safari-vpn-ip-address-encryption-privacy.html

https://9to5mac.com/2021/07/23/turn-on-off-icloud-private-relay-ios-15-iphone-ipad/

https://appleinsider.com/articles/21/06/10/how-apple-icloud-private-relay-works

https://www.theverge.com/22573519/apple-private-relay-icloud-plus-ios-15-ipados-macos-monterey-how-to