Deutsch   English   Français   Italiano  
<vftgmb$1ldn$1@nnrp.usenet.blueworldhosting.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: Andrews <andrews@spam.net>
Newsgroups: comp.mobile.android,alt.internet.wireless
Subject: Re: Was Google Location Accuracy (now is How to Spoof Wi-Fi Location)
Date: Wed, 30 Oct 2024 14:43:24 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <vftgmb$1ldn$1@nnrp.usenet.blueworldhosting.com>
References: <vfhvpo$18uv$1@nnrp.usenet.blueworldhosting.com> <1gynl5ogj1mk6.dlg@v.nguard.lh> <vfjmu0$2kk1$1@nnrp.usenet.blueworldhosting.com> <upbfoijutktx.dlg@v.nguard.lh> <lo6f8sF7ecuU1@mid.individual.net> <vflees$1qt$1@nnrp.usenet.blueworldhosting.com> <pqushj5bcbb63hco2vmkfkbvull8961ksf@4ax.com> <vfmf57$s71$1@nnrp.usenet.blueworldhosting.com> <lo92jiFjd13U1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 30 Oct 2024 14:43:24 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
	logging-data="54711"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/1.6.2-20030910 ("Pabbay") (UNIX) (CYGWIN_NT-10.0-WOW/2.8.0(0.309/5/3) (i686)) Hamster/2.0.2.2
Cancel-Lock: sha1:Y+F4fp5x1newvopKBWaG8b6Hi4c= sha256:13j8Eim+bk+USNtxthlLVyRJXCtS14YvofDPm6XtUjw=
	sha1:jdEaMH5fSaKDVxDHCkTFkSo9zZA= sha256:ObJbgi5qoelSKlkotmx1TcLcXDFpoJ9CKrvABzc4ESM=
Bytes: 3425
Lines: 42

Andy Burns wrote on Mon, 28 Oct 2024 09:08:01 +0000 :

>> I just have to figure out HOW to tell what the heck they're spoofing.
> 
> I doubt anything goes over the wire to be wiresharked, it's a local API 
> on the phone.
> 
> There's sample code on github/stack overflow etc, or just use an 
> existing mock app?

I realize I told Jeff Liebermann a slight mistruth when I said in the post
that Andy is responding to...

  "I just have to figure out HOW to tell what the heck they're spoofing.
   Maybe WireShark, Netstumbler, WiGle, etc., might tell me. Dunno.

   You're the Wi-Fi expert who taught me everything I know, way back in the
   day when I was trying to spoof my MAC address (now the AP MAC addresses 
   are spoofed by default on iOS and Android).

   You told me, long ago, that you can't spoof the ROUTER's WAN-facing MAC
   address though - which - unfortunately - is the one we'd want to spoof!"

Since this thread wasn't about randomizing a MAC address, I didn't notice
that what I said above is slightly wrong in "what" MAC address is
randomized.

To be clear on the current state of Android MAC address randomization:

1. The home router's outward-facing (WAN) MAC address is NOT randomized
   (unless the router software allows that - which I don't know about).

2. What's randomized by default now is the mobile device MAC address
   that connects to the router's LAN-facing access point. This default
   mobile device (iOS & Android) randomization is per access point.

3. For Android only in Developer options" is another privacy setting 
   to randomize #2 per connection (so it changes every time you connect).

When Jeff Liebermann and I last spoke about MAC randomization (oh, maybe
ten or fifteen years ago or so), this default randomization didn't exist.

Now both iOS & Android do MAC randomization (per AP) by default.