WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

281

We have talked about/posted stuff like this for a while. It is something that most people never expected, that your WiFi AP combined with things like google maps mapping your GPS location with your MAC address could create a highly accurate non-consensual surveillance network. I built something similar to this back in the early 2000's and saw the potential for abuse but by then.. I am sure it was already being abused if I could figure it out. Same thing with blutooth id's that everyone leaves turned on all of the time...

Archive: https://archive.today/xs3hS

From the post:

>Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple's WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world.

We have talked about/posted stuff like this for a while. It is something that most people never expected, that your WiFi AP combined with things like google maps mapping your GPS location with your MAC address could create a highly accurate non-consensual surveillance network. I built something similar to this back in the early 2000's and saw the potential for abuse but by then.. I am sure it was already being abused if I could figure it out. Same thing with blutooth id's that everyone leaves turned on all of the time... Archive: https://archive.today/xs3hS From the post: >>Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple's WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world.

(post is archived)

[–] 1 pt (edited )

If you end your AP network name with...

_optout_nomap.

Then both Microsoft and Google should ignore, so I have read.

[–] 0 pt

The one for google I saw was "_nomap." I tried to figure out if the trailing period is required and everywhere I saw it said it was.

This should NOT be a "opt-out". This should be a OPT-IN. ex "_mapme" or something.

It is fucking bullshit to have to opt out of something you don't even know exists since that is the vast majority of the US population. How many times have you seen a AP with _nomap on it? I bet its extremely rare even if you live around other technical people.

[–] 1 pt (edited )

_optout.

Dot?

Yes. Dot. (support.google.com) I've been doing it wrong.

Never seen one except for mine. Life in the out group is a birch.

[–] 0 pt

Same here. I have a lot of "techie" friends too. Not a single one of them do it. I have explained it a hundred god damn times and yet.. they still wont do it.

It took me 10 fucking years to get most of my friends/family to use encrypted messengers like signal. I just told them that if they text me with SMS I wont respond, ever for any reason.

Its so fucking easy now (even 15 years ago this was harder) and yet they refuse to do even the most basic shit. If you can't be fucked to do the basic's I can't be fucked to talk to you.