mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2025-02-20 18:31:35 -05:00
Update
This commit is contained in:
parent
79be8dfb42
commit
7c5a8a5d17
@ -8,3 +8,12 @@ author: Tommy
|
|||||||
Unlike iOS, macOS does not have an easy way to randomize the MAC address. To work around this, various guides recommended several ways to create a randomized MAC address and apply it to the system during runtime. Unfortunately, most of the instructions do not have a proper threat model in mind and will end up making you stick out more from the crowd.
|
Unlike iOS, macOS does not have an easy way to randomize the MAC address. To work around this, various guides recommended several ways to create a randomized MAC address and apply it to the system during runtime. Unfortunately, most of the instructions do not have a proper threat model in mind and will end up making you stick out more from the crowd.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
### The Threat Model
|
||||||
|
|
||||||
|
Consider the following:
|
||||||
|
- macOS does not support MAC address randomization by default
|
||||||
|
- Most if not all macOS computers around you will use their real MAC address with Apple's OUI (the first 3 octets of your MAC address)
|
||||||
|
- You cannot hide that you are using a mac (because of your hostname, connections to Apple's servers, etc)
|
||||||
|
|
||||||
|
Randomizing the mac address only makes sense if you use a not-very-unique hostname (like Macbook-Pro),
|
Loading…
Reference in New Issue
Block a user