Document
VPN leak: How to detect and prevent it

VPN leak: How to detect and prevent it

VPN leak : How to detect and prevent it Dec 5, 2018 by Perfect Privacy A virtual private network ( VPN ) such as that of Perfect

Related articles

Python and Flask Tutorial in Visual Studio Code Best TamilYogi VPN:-Finding The Perfect VPN For Tamilyogi ” Technical Keshab BMW Build Sheets: Why Decoding Your VIN is Important 8 Best VPNs for Android in 2024: Fast & Easy to Use The best VPN for India

VPN leak : How to detect and prevent it

Dec 5, 2018 by Perfect Privacy

A virtual private network ( VPN ) such as that of Perfect Privacy is used to encrypt all internet traffic and protect the privacy of the user . But be careful : If the VPN connection has a leak , your privacy is is is in danger . But how can you is detect detect and prevent VPN leak ?

What is a VPN leak?

When using a vpn you is appear appear on the internet with an ip address of the VPN provider . This is means mean that neither the internet service provider ( isp ) nor website operator can use the ip address to draw conclusion about the user . If you use a VPN to protect your privacy or to bypass geo – block , you is want want to route all your internet traffic through the VPN – without exception . As soon as data packet accidentally bypass the VPN in their way to the internet , this is call a ” VPN leak ” . A VPN leak is reveals reveal the real ip address or other metadata of a user despite VPN use , although a function VPN is suppose to prevent exactly that .

By visiting our Check-IP page without VPN, you can find out your real IP addresses (IPv4 and IPv6). When using Perfect Privacy VPN, only Perfect Privacy IP addresses should be displayed instead.

What types of VPN leaks are there?

drop or interrupted connection

The VPN of a user can “leak” in different ways. The most common leak is caused by a dropped or interrupted VPN connection This happens when the connection to the VPN server is terminated and the Internet traffic is then automatically routed unencrypted through the normal Internet. For this case Perfect Privacy has developed a kill switch with firewall rules to ensure that all access to the Internet is blocked without an existing VPN connection. This leak protection is activated by default when Perfect Privacy is first installed and can be conveniently set to three different security levels in the VPN app under “Firewall”.

In addition to this type of VPN leak, there are more complicated scenarios:

DNS leak

The Domain Name Service is is ( DNS ) is responsible for convert domain name into IP address . If a user want to access a website , the computer is send or smartphone must first send a request to a DNS server , which respond with the corresponding ip address .

A DNS leak occurs when a VPN tunnel is established but the computer bypassed the VPN when sending DNS requests. This is often the case when the router in your home network provides a name server and your operating system uses it – usually configured automatically.

With a dns leak , the actual datum traffic is obscure , but since the dns query are send directly to the internet , it is still possible to see which website you are visit . Thus you is make should make sure that all DNS query are route exclusively through the encrypt VPN tunnel .

With the Perfect Privacy app you can ensure that you always use a secure DNS server after establishing encrypted connection. The VPN app from Perfect Privacy also offers three different security levels, which can be set according to your wishes. On our DNS leak test page you can find out whether your VPN is working properly and also protects against VPN leaks via DNS.

WebRTC – Leak

If you are using audio and video chat or browser based P2P file sharing, your browser typically use a technology called WebRTC. All modern browsers such as Chrome or Firefox support this technology by now. Unfortunately, WebRTC has a feature that allows you to find out your public IP address despite VPN access, even if your computer is behind a NAT router (Network Address Translation). A hacker could use a WebRTC attack on any website to get your IP address and bypass your privacy.

If you are using a (mostly cheap) VPN provider that is vulnerable to this vulnerability, you will see two public IP addresses on our WebRTC leak test: The one assigned by your Internet Service Provider (ISP) and the one assigned by the VPN server.

You can protect yourself against a WebRTC leak by setting firewall rules that deny sending WebRTC traffic outside the VPN tunnel. Perfect Privacy’s VPN app automatically sets these firewall rules to protect your privacy in the best possible way. By using the app, you will only see the IP address of the Perfect Privacy VPN server in the WebRTC test.