FaceTime, WhatsApp and others can expose IPs in calls

2023-11-03 22:41:55

Did you know that in most messaging and calling applications, when you make a call, you are exposing your IP address? This “loophole” is part of how these calls work and, although it can be circumvented in some cases, this issue is often ignored by users.

As demonstrated by TechCrunchthese calls are usually made using connections peer-to-peer (P2P), that is, directly connecting people on the call. The use of P2P is due to greater fluidity and quality, which is what makes the resource work in many places around the world. The problem with the model is that, with it, people on the call has access to the IP address of the person on the other side of the call.

In some situations, it is possible to disable the P2P connection, so that calls are made through the messengers’ servers. This, however, is not the case with FaceTime: according to an Apple security documentation [PDF]the service actually uses a P2P connection to transmit audio on all calls and there is no option to disable it.

The same scenario is observed in Messenger, from Meta. As detailed in a support page, the IP addresses of people on a call are shared with each other so that a P2P connection can be established. Just like with iMessage, it is not possible to disable the connectivity method, so the person on the other end of the call can find out your IP.

No Telegram, the situation is different. P2P connections are only used when both members of the call are contacts of the other. Otherwise, calls are routed through the company’s servers, masking IPs. Another interesting factor is that there is a option to disable P2P connections in any case.

Another messenger that works this way is Signal, which also focuses on privacy. The company highlighted TechCrunch the importance of P2P connections for calls to work smoothly and satisfactorily, although the app only uses them for people who are each other’s contacts or when the user initiates the call. Otherwise, the connection is made by the app’s servers, and there is the option for this to be done every time, like on Telegram. Just go to the Privacy area of ​​the app’s Settings.

O WhatsApp It works in a slightly peculiar way: it alternates between P2P connections and the process of masking IPs with your server in calls, depending on what is best to reduce latency and improve call quality. The good news is that an option is being tested, just like on Telegram and Signal, to disable P2P connectivity by default.

Related Articles:  Discover the Timeless Charm of Louis Vuitton's Mini Bumbag: The Perfect Blend of Elegance and Functionality

Other apps that offer the option to disable P2P connections by default are Viber and the Threema. While the first uses the method generally, the second only does so if the contacts go through a verification process; otherwise, the call goes through the app’s servers to mask the IP. O Snapchatin turn, does not offer a similar option, nor does it confirm whether it uses P2P or not.

It’s worth remembering that not using P2P connections to make calls generally means worse performance. The very use of this method is a kind of trade-off between privacy and efficiency. It is also important not to confuse this issue with end-to-end encryption: in any case, messengers that offer the feature will continue to do so, without having access to the content of the calls.

The option not to use P2P in any situation, however, gives the user the power to choose to be a little safer and not expose their IP address. It would be interesting, for example, if Apple added such a possibility in the future, just as Meta will do with WhatsApp.

FaceTime
of Apple

Version 1.3.8 (1.3 MB)
Requires the iOS 10.0 or superior

1699084891
#FaceTime #WhatsApp #expose #IPs #calls

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.