Summary of Feature Request:
Allow setting of WebRTC IP Handling by the user. If you utilize the WebRTC Leak Test at https://browserleaks.com/webrtc it will show that WebRTC IP Address Detection - Public IP Address. This is not desireable in some cases where one doesn't want their public IP Address exposed.
In Firefox one can modify the behavior and prevent Firefox from sharing the Public IP via:
Type about:config in the address bar and press Enter. In the search bar, type media.peerconnection.enabled and double-click the preference to set its value to false.
In Brave (Chromium) they have an option built into the UI via: Settings -> Privacy & Security -> WebRTC IP handling policy -> Disable non-proxied UDP. When that is selected the leak test will show no public IP. Their default on Brave is the Default setting which does enable the Public IP to be enumerated.
The settings option in the Brave UI:
Default: Unless you are in a Tor tab, WebRTC has the right to enumerate all interfaces and bind them to discover public interfaces.
Default Public And Private Interfaces: WebRTC should only use the default route used by http. This also exposes the associated default private address. Default route is the route chosen by the OS on a multi-homed endpoint.
Default Public Interface Only: WebRTC should only use the default route used by http. This doesn't expose any local addresses.
Disable Non-Proxied UDP: WebRTC should only use TCP to contact peers or servers unless the proxy server supports UDP. This doesn't expose any local addresses either.
FYI -- Have tried various WebRTC Leak extensions from Chrome and Firefox stores and none of them work in Orion but they do work inside Chrome or Firefox.