Troubleshooting technical issues is much easier when both the user and support agent practice clear communication. For this reason, we have provided the template below for you to fill out with information about your issue. Please provide as much detail as possible so we can most efficiently resolve your problem.
Description of the issue:
On an Android device, when using RethinkDNS with a WireGuard proxy configuration, enabling “Block connections without VPN” in system settings, and activating “Lockdown” mode in RethinkDNS, my true IP address is being leaked and detected by the CreepJS browser fingerprint tool (https://abrahamjuliot.github.io/creepjs/).
This issue is not observed in other browsers such as Vanadium (hardened Chromium-based) and IronFox (Gecko-based), which consistently report only the proxied IP address.
Repeated tests over multiple days, with various WireGuard proxy locations, and after clearing browsing data in Brave Beta, confirm the issue persists.
How can this issue be reproduced?
-
Set up RethinkDNS on an Android device.
-
Configure WireGuard proxy within RethinkDNS.
-
In Android system settings, enable “Block connections without VPN.”
-
In RethinkDNS, activate “Lockdown Mode.”
-
Open Brave Beta and visit CreepJS (https://abrahamjuliot.github.io/creepjs/).
-
Observe the reported IP address under Analysis.
-
Compare results by repeating the test with Vanadium or IronFox to confirm that they only display the proxied IP while Brave Beta leaks the real IP address.
Expected result:
Brave Beta should only report the proxied IP address, not the real one, when VPN and lockdown mode are enabled.
Brave Version( check About Brave
):
Brave Beta version 1.75.166
Mobile Device details
GrapheneOS 2025012700 (Android 15.0)
RethinkDNS version v0.5.5n-1-gc74a7ae1
Additional Information: