So when using a VPN and vanidium, a tool such as creepjs is able to accurately fingerprint the device, and knows the real IP of my device.
Note that when checking typical DNS/IP check tools such as mullvad or iVPN DNS leak test there are no leaks. The device shows as connected to the correct VPN DNS and has the VPN IP. But Creepjs is able to establish a fingerprint that contained my real, undisguised IP.
Why is this the case? On iOS using Firefox focus etc, this fingerprinting doesn’t work, and even then so, the actual IP is not known. I tried this on my iPhone and the IP leak doesn’t happen, so how does this happen with vanadium?
Does anybody understand the tool creepJS and how it is able to do this? My IP fingerprint persists even if I change the IP. Note that in IOS this doesn’t happen, the “analysis” section changes on IOS but remains my real IP on grapheneOS.