![]() |
|
![]() |
| Most wifi baseband firmware "helpfully" leaks the true eeprom-written MAC address in places like management frames and beacons:
https://news.ycombinator.com/item?id=13839540 As of 2017 the authors of the paper above found MAC leaks in a shocking 96% of all android phones. And the remaining 4% aren't proven to be leak-free -- they simply hadn't noticed any leaks by the time they wrote the paper. Unless you have fully open-source firmware on your baseband, like ath9k_htc, there's really no way to prevent this leakage. Or even be sure if it's happening. https://wiki.debian.org/ath9k_htc/open_firmware With open source baseband firmware you can guarantee that the baseband never even has access to the hardware MAC address. You can even reflash the MAC address eeprom (on every boot if you like!) |
![]() |
| We actually have an intern researcher working on a path towards an open source implementation of 802.11 for wifi 6 cards but do not have an ETA when our first proof of concept will be released.
We've also reported mac leaks to vendors -- we found stations would transmit packets with their non randomized state in certain scenarios, we'll blog about it when vendors release their fixes. But more importantly I also want to say that I do not expect the MAC leaks are happening in most beacons & probe responses, which is what Apple and Google and others collect for their positional database with wi-fi SSIDs and BSSIDs. There's still ways to fingerprint, from digital fingerprints, to signal fingerprints unique to the radio and antennas and board, where machine learning can cluster and classify devices that are going to be very hard to anonymize for privacy. Projects like https://www.nzyme.org/ actually apply fingerprinting techniques for defense to detect Rogue APs that could manifest in an actively attacked environment. They can pick up wifi implants as well as the Rogue AP attacks. |
![]() |
| Not all are cryptographically signed, no. We have no special documentation but we are also not directly modifying closed firmware either. We are working with mediatek cards and will post more updates this summer. We last posted about our approach 6 months ago, https://www.supernetworks.org/pages/blog/barely-ap-surfaces.
So the randomization bugs we have reported are specifically about stations, namely: mobile smart phone devices failing to randomize their WiFi MAC address. As for the study this thread's topic concerns, I do not have reason to believe that there are bugs with MAC randomization in cards running as APs that would make the randomization of BSSIDs fail. The probe responses and beacon contents appear to consistently use their randomized MAC address in the cards we have tested. There could be underlying actively triggered bugs an active attacker could uncover, to get the non randomized address, but I do not expect such bugs would affect the BSSID + Positional databases of this study. |
![]() |
| > It used to be legal to track people here, but thankfully it’s not anymore.
It not legal anymore, except when you are big enough or you are the one that decides what is legal or not. |
![]() |
| > That blob certainly does DDR training. Maybe it does other stuff. But all of it is done at EL3.
If someone wants to find out, they can load it in IDA/Ghidra? |
![]() |
| Unfortunately wisp/biz/cafe net providers often seem to block randomised mac addresses on device side (I'm guessing the sign on portal they force people thru registers by mac). |
![]() |
| Note the privacy-impaired 802.11bf: WLAN Sensing, https://www.ieee802.org/11/Reports/tgbf_update.htm & https://www.technologyreview.com/2024/02/27/1088154/wifi-sen...
> Someone outside your home could potentially tell when it’s vacant, or see what you are doing inside. Consider all the reasons someone might want to secretly track someone else’s movements. Wi-Fi sensing has the potential to make many of those uses possible.. it could be used by corporations to monitor consumers, workers, and union organizers; by stalkers or domestic abusers to harass their victims; and by other nefarious actors to commit a variety of crimes. The fact that people cannot currently tell they are being monitored adds to the risk. “We need both legal and technical guardrails".. > At least 30 million homes already have some kind of Wi-Fi sensing available.. When the new standard comes out in 2025, it will allow “every Wi-Fi device to easily and reliably extract the signal measurements".. With Wi-Fi 7.., “the sensing capability can improve by one order of magnitude”.. The committee did discuss privacy and security.. But they decided that while those concerns do need to be addressed, they are not within the committee’s mandate.. Wi-Fi sensing is more concerning than cameras, because it can be completely invisible. IEEE standards are a minimum starting point for interoperability. Security and privacy improvements can be implemented in open-source code, to inform future revisions of IEEE standards. |
![]() |
| > Several orders of magnitude exist between researchers and commercial devices in the hands of millions of consumers.
Well, between nation state actors and consumers |
![]() |
| >Self-VPN in target state on residential IP - nope, something else causing the fail
might be caused by the VPN connection reducing the MTU, and the server detecting that. |
![]() |
| Samsung has this on some phones called intelligent wi-fi...
https://docs.samsungknox.com/admin/knox-platform-for-enterpr... >Intelligent Wi-Fi provides four features that aim to improve consumers’ Wi-Fi experience: Network Bearer Switching Auto Wi-Fi Suspicious Hotspot Detection Enhanced Power Saving >Intelligent Wi-Fi is the new brand name of the existing “Adaptive Wi-Fi” which had been applied to models older than Galaxy S10 (e.g. Galaxy S9 or older models). It has been improved by adding a new feature such as Suspicious Network Detection and also enhancing existing features such as Network Bearer Switching. >Auto Wi-Fi >People use Wi-Fi differently based on their location. In places where Wi-Fi is available, we turn on Wi-Fi to avoid being charged for mobile data. On the other hand, if Wi-Fi is always on, we are subjected to frequent, unwanted connections and higher power consumption. To solve this problem, we have introduced Auto Wi-Fi, which turns Wi-Fi on and off depending on your location. Auto Wi-Fi addresses these connectivity-related pain points. >Auto Wi-Fi pays close attention to your connection patterns and remembers your favorite networks. It turns your Wi-Fi on when a favorite network is available. When you leave the area and the network becomes unavailable, Auto Wi-Fi will automatically turn off your Wi-Fi. |
![]() |
| If your phone has wifi enabled, it will collect AP name+location for apple/google and upload it. The same thing happens for bluetooth + ibeacons/edison beacons, airtags, etc. |
![]() |
| This could likely be automated by tapping an NFC proximity tag (e.g. discarded transit card) at your door for entry/exit.
NFC avoids dependency on network-based location positioning. |
![]() |
| "Why Your Wi-Fi Router Doubles as an Apple AirTag", 100 comments, https://news.ycombinator.com/item?id=40430603
> In late March 2024, Apple quietly updated its website to note that anyone can opt out of having the location of their wireless access points collected and shared by Apple — by appending “_nomap” to the end of the Wi-Fi access point’s name (SSID). Adding “_nomap” to your Wi-Fi network name also blocks Google from indexing its location.. > "You may not have Apple products, but if you have an access point and someone near you owns an Apple device, your BSSID will be in [Apple’s] database,” he said. “What’s important to note here is that every access point is being tracked, without opting in, whether they run an Apple device or not.. Commonly used travel routers compound the potential privacy risks.. > The Google/Apple opt out (_nomap) needs to be at the end of SSID name. Whereas the Microsoft opt out (_optout) can be anywhere in the SSID name. Therefore, to opt out of both, it would be in this order: SSIDName_optout_nomap |
![]() |
| My guess is the opt out (versus opt in) nature of this could be the seed of a massive class action lawsuit should the right folks get involved :) |
![]() |
| whatever you have been smoking, i want some
PS: you'd also have to spoof the mac addresses and get a lot of clients to report it, but it could cause some confusion |
![]() |
| > this nonsense
Because the flags are:
|
![]() |
| Feels like the theatre of war where opsec literally means life or death to yourself, you'd be willing to leave your device at base or faraday it or something. |
![]() |
| Call me paranoid, but I have a habit to use a Faraday Bag. Saving a lot of battery and knowing when and where to activate. Welcome to the future. :) |
![]() |
| How does a faraday bag save battery? Normally I find that in areas of poor mobile signal, the phone ramps up the power to keep contacting towers and burns through the charge much quicker.. |
For use as a travel router the UI makes it simple to randomize both the AP BSSID/MAC as well as interfaces working as WiFi client stations for internet uplink.