Digging Deeper: WiFi Tracking Case Study (NOW PUBLIC, Orig: Oct, 2023)

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024
  • Covering Long Distance WiFi MAC Address Tracking, Hostnames, Saved SSID Tracking, Trilateration, How Wipri Mitigates And True Story That Helped Inspire Wipri (on Gitea Onion);
    Wireless Devices Rely On Radio Based Protocols, Offering Many Avenues For New Persistent Tracking; We Use Real Stories And Evidence To Share How Wipri Can Help Protect You And Your Devices From Invasive Privacy Invasions Of The Wireless, And Wired Persuasion.
    SHARE your thoughts in the comments below!
    Join me today in this. Leave a comment, share a thought.
    EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p
    (VIDEO SHARED EARLY ON PUBLIC BLOG: bmc.link/polit...)
    Watch, And Share With Others!
    I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
    If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
    💎 *CONSIDER SUPPORTING THIS CHANNEL* (Thank You)
    MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
    CASHAPP - cash.app/$Huma...
    MEMBERSHIP: bmc.link/polit... (early / exclusive / more)
    SUPPORT OPTIONS (LIST): bmc.link/polit...
    *PUBLIC BLOG:* bmc.link/polit...
    First shared on public blog: buymeacoffee.c... (follow blog for free and / or optionally support this work)
    📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
    📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
    #surveillance #anonymous #macaddress

Комментарии • 42

  • @RTPTechTips
    @RTPTechTips  6 месяцев назад +1

    ℹ 📺 *Video originally shared as "extra, thank you content" w/members on October, 2023... Now Public, For All!* Some content may contain sensitive info that may not be desirable public - outside that, try to make everything possible public, eventually. Try wipri (and stop worrying with -w flag): gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/wipri (new updates coming up)

  • @johnsmith-tu9ii
    @johnsmith-tu9ii 6 месяцев назад +3

    1st time viewer but not the last time. Great Video... Thanks

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +2

      Cheers and glad you like it!

  • @joshuatimothy2966
    @joshuatimothy2966 6 месяцев назад +3

    We need a mobile version of this (even if it can 'change' the mac adress of the device) the mac adress of the os would be a bonus
    As always great vid

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +2

      Thanks for watching Josh! I'm a computer guy myself, but definitely take advantage of apps available. ;)

    • @bogganalseryd2324
      @bogganalseryd2324 6 месяцев назад

      ​@@RTPTechTipsYes, Mobile version is even more needed imho. They use our phones as their personal listening devices.

  • @MrCaLFreddyG
    @MrCaLFreddyG 6 месяцев назад +2

    Really nice work, thank you.

  • @Retutlard
    @Retutlard 6 месяцев назад

    Love the work you’ve done man, it’s great to see people building tools around privacy concerns

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад

      Thanks. appreciate that!

  • @demandred1957
    @demandred1957 6 месяцев назад

    Based. Have a sub. will be checking out more of your videos tonight when i get home.

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад

      Appreciate that! Thanks for checking things out. 😎

  • @alienJIZ1990
    @alienJIZ1990 5 месяцев назад

    Great video! Definitely gonna check out the tool!
    Few thoughts though: if users test this at home, depending on how often it's configured to change, be sure not to use up all your DHCP leases. A while back, my roommate at the time was destroying my leases with randomized MAC Addresses every connection, so I banished him to his own isolated VLAN with nothing else on it like I should've done from the get-go lol
    Also, while I can't attest to stock PixelOS or other mobile, I can confirm that GrapheneOS spoofs every section of the MAC Address perfectly - the "Per Network" setting I've found best for home mobile to avoid killing leases but still use DHCP Reservations, but Windows, last I checked, does as you described, it does not spoof as well, keeping the first few static - I noticed this too when my roommate's MAC kept changing, glad someone else is finally calling it out
    Lastly, the Device Manager MAC Spoofing trick is still decent in a pinch because even though that bug is scary, it just goes to show that you need to always, ALWAYS, verify that your changes took place, especially with network settings. Looking forward to checking out the tool though!

  • @hanfo420
    @hanfo420 6 месяцев назад +1

    Always a good idea to type stuff in your browser combo bar 😂
    Also e.g. iOS is spoofing the whole mac, it’s not keeping any bits.

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад

      That's good to hear. I know many smartphones are spoofing, but leaving invalid mac addresses - giving away the fact it is spoofed.
      I'm not sure if apple is doing this, but never been a fan of the invalid mac spoofing personally. Since it gives away that it is not the real address (all fake OUI's are crossed out, highlighting perm) JMO.

    • @DarrellWebb537
      @DarrellWebb537 6 месяцев назад

      iOS's implementation is a meme. For three years iPhone privacy feature was leaking the unique mac on port 5353. Also their implementation is spoofing the mac address per network (SSID). This really doesn't make a difference then not spoofing the mac unless you were to delete your saved connections before every time you re-connect to a network.
      Wipri and other projects spoof the mac per connection, so every time a connection is made it is a different mac address. This is a big difference as compared to only spoofing and saving/using the mac address per network (SSID).

  • @RTPTechTips
    @RTPTechTips  6 месяцев назад +1

    This video uses real stories, sharing what inspired wipri. *It's important to note, while I DON'T support illegal activity, we can learn a lot about tracking, our human right to privacy, by referencing stories like these. Who better to teach us, than the success stories of trackers themselves?*

  • @selfcontrol9982
    @selfcontrol9982 6 месяцев назад

    Thank you for the truth. Even if Apple products are turned off they're still Apple Air Tags.

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад

      Very welcome! Might do a follow up at some point with demonstrations. It's an idea.

  • @mblend27
    @mblend27 6 месяцев назад +1

    Unfortunately this is completely irrelevant - the MAC address the ISP would see (aka the stuff the server your connecting to has access to) is the MAC address belonging to the router.
    Spoofing the MAC address on your computer does nothing to help your privacy UNLESS you are directly plugged into the modem (no one does that anymore).
    Spoofing your MAC address on your router will give you a new IP as well

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад

      It appears limited on the surface: if limiting ourselves to just that type of sniffing alone - initial wireless sniffing allows someone to see those devices outside a home, down the road, which network they are connected to etc.
      But it doesn't have to end there: to determine which one connects to Tor: Chuck in an **** **** (technique redacted - but will show on your notification - might save the rest for video), and you can know exactly which one connects to Tor, and when (possibly what happened to the individual in story).
      So, as the story is told, mac address for this individual was 100% relevant (in the court docs as well), to example story, when thinking outside of the box.
      Mitm reveals entry, and device mac.

  • @MrCHATTERJEE01
    @MrCHATTERJEE01 6 месяцев назад +1

    can we use vpn(wireguard) in tails or whonix ?
    vpn before tor ??
    any other OS that support it ?
    OS must boot from usb(pendrive)
    or its impossible to be anonymous ?
    I'm new & learning.. 🙂

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +1

      One easy solution would be a VPN hardware router - that force routes all devices through VPN.
      Still, most don't need a VPN at all - and in some cases they become a liability.
      You can also use bridges - I suggest snowflake as it uses random tor users donating their connection, and data appears as video / voice calls.

    • @MrCHATTERJEE01
      @MrCHATTERJEE01 6 месяцев назад

      ​@@RTPTechTips Thanks for suggestion
      vpn wifi router is great idea..
      what OS you used for mac address changing..
      KALI ?
      need more(very basic) video on wipri
      (I'm windows user, for past 3-4 days I'm learning these)
      I'll watch your videos.. 🙏

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +1

      I use many operating systems, depending on the device.
      Some examples, Arch, Debian / Kicksecure, etc (applying wipri on each).
      I created more videos / tutorials / writing on using WiPri.
      Here are some recommended to start: bmc.link/politictech/wifi-privacy-with-wipri-any-linux-device
      bmc.link/politictech/new-wipri-features-ethernet-wifi-identifier-spoof
      wipri can run as a command on any linux system - to have it start at boot, it currently requires systemd (found on 99% of linux operating systems - so can run on pretty much all, out of the box).

    • @MrCHATTERJEE01
      @MrCHATTERJEE01 6 месяцев назад

      @@RTPTechTips Thanks 🥰

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +1

      @@MrCHATTERJEE01 Welcome!

  • @notafbihoneypot8487
    @notafbihoneypot8487 6 месяцев назад

    Remember to physically remove your BT mod and Carry around a Ethernet cord for your phone 📱📱📱📱

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +1

      Good tip. Bluetooth can turn on you. 🫨
      For anyone reading this, wipri also has -b to block bluetooth at boot or otherwise, for anyone reading (can be set for boot - change boot flags anytime with another run of install.sh).
      Humans have rights. Only evil or naive ppl think they have a right to monitor everyone who is doing nothing wrong.
      That's my stance on the subject.

    • @notafbihoneypot8487
      @notafbihoneypot8487 6 месяцев назад

      @@RTPTechTips based! I also like that GOS lets you block apps at the network lvl
      Body sensors and BT. More control over your device is always better.

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +1

      Absolutely - I may be a computer person, but GOS is nice phone option! Thoughtful design.

  • @freman
    @freman 6 месяцев назад

    seems dumb to keep the oui it also seems dumb that the oui is such a big number there can't be that many companies... 3 octets isn't a very big space, but it's still big enough to argue the 1 in a million angle.

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +1

      I totally understand why they do it, but also can see some weaknesses on preserving OUI. Some brands may no longer be used, or infrequent in location, that kind of thing. At least it becomes somewhat of a choice, what we decide to do.

  • @MrCHATTERJEE01
    @MrCHATTERJEE01 6 месяцев назад

    extremely helpful video

  • @motokokusanagi2675
    @motokokusanagi2675 6 месяцев назад

    Sorry for my noob question, but how do I git clone a repo like yours that is hosted as onion? Tried to use torsocks before the git clone command and nothing
    Also, would love to see a video of you actually using the wipri and showing that it works, example: running with X flags and then showing that the hostname, mac, etc actually changed in the terminal, something like a hands-on video ☺

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +2

      I will probably be doing more wipri related videos as I work on new features - have some examples if you search the channel for them.
      I tend to do a new demonstration video when a new feature is added.

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +2

      First of course make sure to have tor client running and connected fully: systemctl start tor
      I use: torsocks -i git clone gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/wipri.git
      Sometimes it may appear like an error, but usually downloads fully, either way! Take a look and see if wipri directory was created.
      If that doesn't work for you, downloading directly (using Tor Browser) is at this link:
      gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/wipri/archive/master.tar.gz

    • @motokokusanagi2675
      @motokokusanagi2675 6 месяцев назад +1

      @@RTPTechTips tor is running and connected, I checked in the systemctl status tor, but I always get an error "Not resolving .onion address (RFC 7686)" when trying to run this command, but I will download directly using the browser as you mentioned, thanks!

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад +2

      @@motokokusanagi2675 Ah, yeah, some operating system updates broke this for some. Look into socks proxy settings if interested in using in future - as that is what some are using to correct it.

  • @sotecluxan4221
    @sotecluxan4221 6 месяцев назад