To address the potential XY: you don't really stand out merely by having WebRTC disabled. It can be disabled for lots of very routine reasons, like a corporate group policy.
If you're worried about fingerprinting to that degree, you should also worry about fingerprinting by monitor size and resolution, and any number of other features that can be detected via JavaScript. In which case, use Tor browser, which does a lot to obfuscate you.
As to hiding your IP address:
In about:config
set
media.peerconnection.ice.proxy_only
to true
. Undocumented feature that blocks WebRTC that does not come through your proxy.
media.peerconnection.ice.relay_only
to true
. This can be used to block all local (LAN) and external IP addresses from being generated as candidates. This does not hide your external IP address from the TURN server itself, so if your attacker attempts to start a connection and specifies a TURN server they control, this won't be enough.
To mitigate the risk from #2 above but still use WebRTC, additionally set
media.peerconnection.use_document_iceservers
to true
and then
media.peerconnection.default_iceservers
to the list of servers you wish to use and trust, uch as your VPN's.
When use_document_iceservers
is false, it will refuse to use peers specified by the web page and instead only use the ones specified in default_iceservers
. If you fail to provide a list of default_iceservers
, FireFox may revert use_document_iceservers
as a fallback.
As to a "canonical method to deliberately leak a fake IP through WebRTC instead of simply disabling it entirely", in a way which will not disable WebRTC but which will break it, set media.peerconnection.ice.force_interface
to a 0.0.0.0
, a non-routable address (or anything in 10.0.0.0/8
, 172.16.0.0/12
or 192.168.0.0/16
should work).
It's probably simplest to just disable it - there are lots of other ways a sneaky page can fingerprint or track you in a regular browser.
References: https://wiki.mozilla.org/Media/WebRTC/Privacy
Note to future readers: These are all moving parts, some are currently semi- or un-documented, so things may change by the time you read this.