this post was submitted on 16 Jan 2025
48 points (100.0% liked)

askchapo

22849 readers
252 users here now

Ask Hexbear is the place to ask and answer ~~thought-provoking~~ questions.

Rules:

  1. Posts must ask a question.

  2. If the question asked is serious, answer seriously.

  3. Questions where you want to learn more about socialism are allowed, but questions in bad faith are not.

  4. Try [email protected] if you're having questions about regarding moderation, site policy, the site itself, development, volunteering or the mod team.

founded 4 years ago
MODERATORS
 

I was thinking “Vladimir LANin”

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 3 days ago (1 children)

How does that make you easier to track?

Unless you turn off WiFi, phones are always searching for WiFi anyway.

[–] [email protected] 2 points 2 days ago* (last edited 2 days ago) (1 children)

Most devices actively ask around for the hidden SSIDs they know about. As in, they send a broadcast in cleartext called a "probe request" containing the list of hidden SSIDs every time they scan for access points.

Today usually the scans use randomised MAC addressess for privacy, but that doesn't help if you have any hidden SSIDs stored because of this list. Places like shopping malls are known to use these beacons to track the movements of individual people.

Before 802.11w (that still works almost always because 802.11w tends to be deactivated for compatibility), there was a trivial way to "unmask" a hidden SSID, you have to wait for someone to talk to the target access point, send a disassociation frame to the victim, and wait for the probe request / response when the victim automatically reconnects.

[–] [email protected] 2 points 2 days ago

Do that many people use hidden ssids that it's worth for non-state actors to track them?