Browsers can pull your hardware MAC address - even when you've set a different one (thanks Google).
It should be possible to send a faked one? I could patch the browser to generate a new one hourly/daily/weekly, according to the appropriate rules how a MAC address is made?Browsers can pull your hardware MAC address - even when you've set a different one
Why's that?(thanks Google).
What is RA-receiving? I'm fetching that RFC 4941, but maybe you can explain quicker than I can read the RFC...In rc.conf I use,
### IPv6 options: ###
ipv6_privacy="YES" # Use privacy address on RA-receiving IFs
You mean the sign-in page of that WLAN access point? You have to sign-in in that Stubbucks café to get internet access via their WLAN? Ok, then it's not your browser that's extracting your MAC address, but the WLAN router you're connecting to, tells that the web interface where you sign in. No matter who's their ISP. If OTOH you mean the sign-in page of any Giggle service like YouTube, then that's probably another story.I'll explain. On a different OS, I hop on to wifi at the local Starbucks. Google is the provider. I see my physical MAC address in the location bar URL of the sign-in page.
Only very few carrier-grade commercial network hw allows the user/admin to fake the MAC address. I strongly doubt you have such. The driver may allow you to set the MAC address; but the average consumer hw will not take that, it uses the burned in MAC address, and rightly so. There's just too many things an non-expert user could misconfigure. I had a 4-port Sun QFE in a UltraSPARC box that allowed me to set the MAC adress. The manpage read s/th like this: hme(4) (FreeBSD)I clear cache and cookies, change MAC to a fake one, and try to login again. Physical MAC re-appears in the location bar. The browser extracts it somehow.
On sparc64 the hme driver respects the local-mac-address? system
configuration variable which can be set in the Open Firmware boot monitor
using the setenv command or by eeprom(8). If set to “false” (the
default), the hme driver will use the system's default MAC address for
all of its devices. If set to “true”, the unique MAC address of each
interface is used if present rather than the system's default MAC
address.
How do you know that? Are you sure? See above: I strongly doubt you can set the MAC address that goes out to the wire or antenna. The driver's: yes. The HW doesn't give a sh(1)t.Yes my traffic over WiFi uses the fake MAC
IMHO that's not so clear. They track you, yes, but probably not by your MAC address.but doesn't prevent Google from tracking me.
I'll explain. On a different OS, I hop on to wifi at the local Starbucks. Google is the provider. I see my physical MAC address in the location bar URL of the sign-in page.
root@jigoku:/ # ifconfig -a
bge0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=c019b<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,VLAN_HWCSUM,TSO4,VLAN_HWTSO,LINKSTATE>
ether b0:0b:de:ad:b0:0b
inet 192.168.1.7 netmask 0xffffff00 broadcast 192.168.1.255
media: Ethernet autoselect (100baseTX <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
options=680003<RXCSUM,TXCSUM,LINKSTATE,RXCSUM_IPV6,TXCSUM_IPV6>
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x2
inet 127.0.0.1 netmask 0xff000000
groups: lo
nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
pflog0: flags=141<UP,RUNNING,PROMISC> metric 0 mtu 33160
groups: pflog
root@jigoku:/ # ifconfig bge0 ether DE:AD:B0:0B:DE:AD
root@jigoku:/ # ifconfig -a
bge0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=c019b<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,VLAN_HWCSUM,TSO4,VLAN_HWTSO,LINKSTATE>
ether de:ad:b0:0b:de:ad
hwaddr 1c:75:08:22:06:65
inet 192.168.1.7 netmask 0xffffff00 broadcast 192.168.1.255
media: Ethernet autoselect (100baseTX <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
options=680003<RXCSUM,TXCSUM,LINKSTATE,RXCSUM_IPV6,TXCSUM_IPV6>
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x2
inet 127.0.0.1 netmask 0xff000000
groups: lo
nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
pflog0: flags=141<UP,RUNNING,PROMISC> metric 0 mtu 33160
groups: pflog
root@jigoku:/ # ifconfig bge0 ether b0:0b:de:ad:b0:0b
root@jigoku:/ # ifconfig -a
bge0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=c019b<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,VLAN_HWCSUM,TSO4,VLAN_HWTSO,LINKSTATE>
ether b0:0b:de:ad:b0:0b
inet 192.168.1.7 netmask 0xffffff00 broadcast 192.168.1.255
media: Ethernet autoselect (100baseTX <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
options=680003<RXCSUM,TXCSUM,LINKSTATE,RXCSUM_IPV6,TXCSUM_IPV6>
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x2
inet 127.0.0.1 netmask 0xff000000
groups: lo
nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
pflog0: flags=141<UP,RUNNING,PROMISC> metric 0 mtu 33160
groups: pflog
And you connect to your WiFi with that bge(4)? I knew you're magic!
Just look at what data they actually use and see how unique you areDelete their cookies often, IIUC that's their main method to identify the user, plus CPUID? Can a browser access the cpuid? Can they identify me by reading (from a .js running in my browser) a SSL seed or such that's pinned by my SSL/TLS library? I.e. today it's the same like last week? I'm a total noob when it comes to this crypto stuff...
EDIT I cited none, but just do some wild guessing. See above: I'm a noob...
You don't need to custom build the browser to become uniquely identifiable.I figure a custom-compiled Firefox on Freebsd is pretty darn unique.
Another reason why using only IP4+NAT might have some (small) advantages.Browsers can pull your hardware MAC address - even when you've set a different one (thanks Google).
Thank you, you're very generous.Sheer Black Sheep Sorcery to you.
Oops! We ran into some problems.
I do like that Tutorial. It's is very contemplative.I've passed on my Black Sheep Sorcery Skills in the obscure guise of a Beginners Tutorial for those Birthday Party Level Magicians who wish to become FreeBSD Daemon Level Sorcerers.
No, but how about Devilene?Don't count on me making any changes due to it unless it's needed to make it do something it doesn't already or better it somehow.
I just blend in with the crowd as long as JS isn't enabled for a site. It's denied globally and enabled on a site by site basis. Not that one:Just look at what data they actually use and see how unique you are
User agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36
Yes, there remain some data that can be extracted from what remains.I just blend in with the crowd as long as JS isn't enabled for a site. It's denied globally and enabled on a site by site basis. Not that one:
Code:User agent Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36
I called it Black Sheep Sorcery because not long after joining the PC-BSD forums as beta tester I found x11-wm/fluxbox and abandoned KDE3. Then dumped their .pbi Push Button Installer that reminded me of a Windows .exe in favor of learning ports.Thank you, you're very generous.
portsnap
was a command when I asked where it could be found in ports, lest lamb chops be listed on the menu.Forum related problem to correctly display uploaded images.Oops! We ran into some problems.
You do not have permission to view this page or perform this action.
Thank you. It's what's known in my circles as a Task Analysis. Not everyone can do it.I do like that Tutorial. It's is very contemplative.
No, but how about Devilene?
Ok. But I have to make sure about copyrights before I can copy & paste her to a shirtprinter.companyAbandon all hope of Devilene undergoing Graphic Image Breast Reduction done by me. She said so.
Unfortunately I am quite unique. One of the things that was really annoying is that my list of fonts is one of the most unique things about me. That led me to find this Firefox addonJust look at what data they actually use and see how unique you are
Good to see there exist "fingerprint defender" plugins already.Now I'm unique every time I load the page, which is exactly what I want.
You know that? Are you sure? See above: I strongly doubt you can set the MAC address that goes out to the wire or antenna.
I have an Ethernet LAN hooked into a router that goes into the cable box out the cable into the Internet.I have to refresh my knowledge of the topics networking basics & privacy... You're sniffing the WLAN traffic with another box, and your FreeBSD box sends out a fake MAC address out in the air?