So many people here will go though great lengths to protect themselves from fingerprinting and snooping. However, one thing tends to get overlooked is DHCP and other layer 3 holes. When your device requests an IP it sends over a significant amount of data. DHCP fingerprinting is very similar to browser fingerprinting but unlike the browser there does not seem to be a lot of resources to defend against it. You would need to make changes to the underlying OS components to spoof it.

What are everyone’s thoughts on this? Did we miss the obvious?

https://www.arubanetworks.com/vrd/AOSDHCPFPAppNote/wwhelp/wwhimpl/common/html/wwhelp.htm#href=Chap2.html&single=true

  • @[email protected]
    link
    fedilink
    English
    45 months ago

    Most modern operating systems randomize the MAC.

    [citation needed]
    having the option to randomize the MAC is not the same as actually doing that. There are also a few downsides to random MACs, like captive portals not remembering you on public WiFis.

    • Redjard
      link
      fedilink
      25 months ago

      The default on android is to give every wifi network its own random but static mac.

    • @[email protected]
      link
      fedilink
      15 months ago

      Captive portals not remembering you between sessions is a huge bonus for captive portals with time limits.