So many people here will go though great lengths to protect themselves from fingerprinting and snooping. However, one thing tends to get overlooked is DHCP and other layer 3 holes. When your device requests an IP it sends over a significant amount of data. DHCP fingerprinting is very similar to browser fingerprinting but unlike the browser there does not seem to be a lot of resources to defend against it. You would need to make changes to the underlying OS components to spoof it.
What are everyone’s thoughts on this? Did we miss the obvious?
Using randomized MAC on my phone’s, and observing the behavior on my network. It works fine, the router can’t assign a ip to the device because the physical address changes. The os fingerprinting still works, the gateway knows what kind of device it’s talking to.
Android? How do I force it to use a random Mac every time? It pins a random Mac to a given network, which greatly reduces privacy between sessions.
Developer settings for newer androids.
GOS has it on by default https://grapheneos.org/features#wifi-privacy
How do I install this on non-Graphene OS?
Developer settings
https://source.android.com/docs/core/connect/wifi-mac-randomization-behavior?hl=zh-cn
Eh, I tried it. It doesn’t work. Even the option says that it “may” change the mac on reconnect.
What android are you running?