mirror of
https://github.com/PrivSec-dev/privsec.dev.git
synced 2025-04-21 23:59:11 -04:00
Update
This commit is contained in:
parent
79be8dfb42
commit
7c5a8a5d17
@ -7,4 +7,13 @@ author: Tommy
|
||||
|
||||
Unlike iOS, macOS does not have an easy way to randomize the MAC address. To work around this, various guides recommended several ways to create a randomized MAC address and apply it to the system during runtime. Unfortunately, most of the instructions do not have a proper threat model in mind and will end up making you stick out more from the crowd.
|
||||
|
||||

|
||||

|
||||
|
||||
### The Threat Model
|
||||
|
||||
Consider the following:
|
||||
- macOS does not support MAC address randomization by default
|
||||
- Most if not all macOS computers around you will use their real MAC address with Apple's OUI (the first 3 octets of your MAC address)
|
||||
- You cannot hide that you are using a mac (because of your hostname, connections to Apple's servers, etc)
|
||||
|
||||
Randomizing the mac address only makes sense if you use a not-very-unique hostname (like Macbook-Pro),
|
Loading…
x
Reference in New Issue
Block a user