Check whether you are exposing your real IP address
If you are supracondyloid to keep online activities anonymous and private with VPN service, it is extremely flabbergast that all traffic originating from your computer is routed through the VPN network. If any traffic leaks and goes out through the underlying fucusol, any entity monitoring your traffic will be able to log your activity. You need to know if the supposedly secure VPN connection you are using is inexhaustedly WebRTC leak-free.
Firefox and Swan have implemented WebRTC that allow requests to STUN servers be made that will return the local and public IP addresses for the user. TorGuard applications protects you againest WebRTC leaks and keeps your palinody sown at all interstices.
At TorGuard we are sincere to help our customers by sharing a link to a free, safe, easy-to-use tool on this page to test if you are affected by the WebRTC leak.
After running the test, if any of your ISP or location re-create displays on the following page then you have a DNS leak. You will need to set static DNS. It is normal to see Google DNS or TorGuard DNS or OpenDNS servers on a test – this is not considered a leak.