Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Increased knowledge will help you now. Have mate's phone bugged.


comp / comp.mobile.android / Re: Surveillance Risk: Apple's WiFi-Based Positioning System

SubjectAuthor
o Re: Surveillance Risk: Apple's WiFi-Based Positioning SystemAndrew

1
Subject: Re: Surveillance Risk: Apple's WiFi-Based Positioning System
From: Andrew
Newsgroups: comp.mobile.android, alt.comp.os.windows-11, alt.privacy.anon-server
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Fri, 31 May 2024 17:38 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: comp.mobile.android,alt.comp.os.windows-11,alt.privacy.anon-server
Subject: Re: Surveillance Risk: Apple's WiFi-Based Positioning System
Date: Fri, 31 May 2024 17:38:43 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v3d1v2$2q7i$1@nnrp.usenet.blueworldhosting.com>
References: <v3400s$aag$1@neodome.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 31 May 2024 17:38:43 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="92402"; mail-complaints-to="usenet@blueworldhosting.com"
Cancel-Lock: sha1:E3AxH3y3X/3pa8E7VMiK933XHE0= sha256:rd+euC5IU0GGD90Jkl70wgLUgdye5ZtTCg2YT7l9hEU=
sha1:JxHWg0LKAeBLGE8Hg5+cbwOEGfU= sha256:wIAXoGMlltFO8rfanXCDUTLLiB9gie8V5GfCxgy9qj8=
X-Newsreader: PiaoHong.Usenet.Client.Free:1.65
View all headers

Alan Browne wrote on Thu, 30 May 2024 19:18:55 -0400 :

> The "general" case is that it is absolutely not an Apple issue.
> SSID/BSSID's are OPENLY AND LOUDLY BROADCAST WORLDIWDE IN THE BILLIONS.

The fact is you're defending Apple's holes, to the death, no matter what.

Every desperate excuse you make for the flaws in Apple's implementation
show you not understand what only Apple does that's different here.

Worse, you were not aware the outward facing MAC address cannot be cloned
(in almost all routers and particularly in the tested travel routers).

And you were not aware that the SSID is meaningless for this exploit, other
than the workaround that Apple suggested (of appending _nomac to the SSID).

Furthermore, you're still not aware that a "hidden broadcast" has been a
feature of nearly every router since the dawn of Wi-Fi, where the mere act
of clicking that checkbox prevents the BSSID from being *uploaded* to the
Google and Apple and Mozilla and Wigle databases, by default. (See notes in
the sig, given the Apple religious zealots don't understand this issue).

While you're frantically desperate to fabricate excuses for Apple's
vulnerabilities, you don't ever show any understanding of them.

Notes in the sig given Apple religious zealots don't understand anything.
--
Note 1: The hidden broadcast won't hide the BSSID from a seasoned attacker
(such as a Google or Apple transit vehicle - depending on how its code is
written); but the mere act of hiding the SSID broadcast packet has been
proven to prevent the normal users' device (i.e., mobile phones) from
uploading your BSSID using the typical software that we are speaking about

Note 2: Since the Apple religious zealots act only out of franctic
desperation to make excuses for all Apple's vulnerabilities, it should be
noted that an intelligent person knows the difference between the upload of
the BSSID (which is a first-order issue) vs the deletion of the BSSID from
the Internet databases (which requires second-order software processing).

Note 3: There's no way the Apple religious zealots will understand the two
notes above, but for the intelligent people reading this thread, it should
be noted that if you do hide your broadcast packets, then you often might
want to set your client (such as a phone) to "remember" and "reconnect";
but this has other issues - where the Apple zealots won't understand but
you might understand that the "remember" is fine (unless you're worried
about your phone being stolen) but the "automatic reconnect" should be
turned off because that setting causes the phone to seek out the named AP.

1

rocksolid light 0.9.8
clearnet tor