you are viewing a single comment's thread.

view the rest of the comments →

[–]TaseAFeminist4Jesus 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (4 children)

I worked professionally in mobile development for several years.

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (3 children)

Then why do various privacy linux distributions spoof Mac addresses?

[–]TaseAFeminist4Jesus 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (2 children)

Presumably they are trying to secure against devices listening on the same subnet. After all, the wireless router in your house needs to know how to deliver packets to you. It needs you MAC address, and it associates it with the synthetic IP address you get on your own network (10.11.. or 192.168..). The MAC address does not propagate beyond that network, though.

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (1 child)

I realize it doesn't propagate: a hacker breaking in can possibly get access to it. Otherwise, why worry about spoofing it. With computers and cellphones it's different, because you are connecting to websites with data gathering technology.

[–]LarrySwinger2 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Just stop making up bullshit already.