WebRTC is a peer-to-peer communications protocol for web sites and therefore causes numerous privacy issues through making direct connections between participants. By default our Vanadium browser disables the peer-to-peer aspect by only using server-based (proxied) connections.

Vanadium provides a user-facing setting at Privacy and security > WebRTC IP handling policy.

From least to most strict:

Default
Default public and private interfaces
Default public interface only
Disable non-proxied UDP

For Vanadium, "Disabled non-proxied UDP" is the default.

The tracking technique described at https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/ is prevented by Vanadium's default "Disabled non-proxied UDP" value. It's also prevented by "Default public interface only", which does permit peer-to-peer connections but won't try to use the loopback interface for it.
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers

Abuse allows Meta and Yandex to attach persistent identifiers to detailed browsing histories.

Ars Technica
We have a list of most of the features provided by Vanadium at https://grapheneos.org/features#vanadium. There are dozens of additional privacy and security features planned along with data import/export and improved support for system backups. It takes time to implement these things properly.
GrapheneOS features overview

Overview of GrapheneOS features differentiating it from the Android Open Source Project (AOSP).

GrapheneOS
Vanadium doesn't have billions or even millions of users which limits our ability to prevent fingerprinting. We plan to address this by launching it for use outside GrapheneOS including publishing it through the Play Store. We want to implement more of the planned features first.
For the non-WebRTC issue being abused by Yandex, Chromium 137 shipped a fix for it behind a feature flag that's being gradually rolled out. We can roll this out to 100% of Vanadium users through a Vanadium Config update. We can start Alpha testing for that new flag later today.
@GrapheneOS Great - I will wait for the Alpha release for testing.
@lusca Note it will just be an Alpha release of Vanadium Config since we have that to avoid needing browser updates to change flags or update content filters. Chrome simply fetches flags from a server and it's largely based on randomized subsets of users for different feature trials. We prefer rolling out the flag changes via our Alpha, Beta and Stable channel system to 100% of the users on each channel via Vanadium Config. We don't like doing staged rollouts or A/B testing the way they do it.

@GrapheneOS So, in theory, updating Vanadium Config could be used to test flags in Alpha such as:
chrome://flags/#strict-origin-isolation
chrome://flags/#origin-keyed-processes-by-default
chrome://flags/#enable-fingerprinting-protection-blocklist-incognito

Note: These are just example flags.