So many people here will go though great lengths to protect themselves from fingerprinting and snooping. However, one thing tends to get overlooked is DHCP and other layer 3 holes. When your device requests an IP it sends over a significant amount of data. DHCP fingerprinting is very similar to browser fingerprinting but unlike the browser there does not seem to be a lot of resources to defend against it. You would need to make changes to the underlying OS components to spoof it.

What are everyone’s thoughts on this? Did we miss the obvious?

https://www.arubanetworks.com/vrd/AOSDHCPFPAppNote/wwhelp/wwhimpl/common/html/wwhelp.htm#href=Chap2.html&single=true

  • Schwim Dandy@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    Does randomizing your MAC create any usability issues? Needing to log in repeatedly, getting bumped off network due to looking like a different device, anything else hindering usability?

    • makeasnek@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 months ago

      No, you may have to re-login every time you connect, but once you connect, your MAC would be stable for that session.