Hi, so for the last couple days I am on a quest to evade detection for a project that proved to be quite challanging. As I researched the issue, I noticed that my real IP leaks through WebRTC with a default Crawlee Playwright CLI project. I see a commit to the fingerprint-suite that I think should prevent that, but based on my tests it doesn't. Does it need special setup or anything?
Hi @Jeno It was already discussed here so you can read through it to find more details. In summary: our types in crawlee were not correct, that part will be fixed in the next release. But its just a typing issue, you can try using the mockWebRTC option. https://github.com/apify/crawlee/pull/2705