What kind of information is leaked through Wi-Fi?

MAC address?
Are those baked into hardware or are they randomised like tokens?
Probe requests?
What exactly are they?

Attached: osi.gif (250x250, 7.42K)

Other urls found in this thread:

en.wikipedia.org/wiki/Medium_access_control
twitter.com/NSFWRedditVideo

Did you even try to investigate before posting this?

mac address it's the address of your mac computer

...

How can you know MAC but think posting here is a more efficient way to get basic info than reading the fucking kikepedia article or something?

This, Gentoo computers have a lin address

Attached: 1439759638829.png (600x800, 396.55K)

Lmao

You mean to say that the networking layer model is obsolete, pointless and meaningless?

I mean to say that no one fucking uses the presentation layer.

lol op is a macfag.

The presentation layer of the OSI model conceptually does have its distinct purposes such as file format/encoding, compression, encryption etc. It's just that in practice it'ss basically always handled by the same piece of software which also implements the application layer functionality.

Yup. Applel controls media access on all Ethernet hardware in the world.

That's why practically the TCP/IP model is better as far as the top of the stack is concerned, as it bundles everything above transport together as "application layer", as that's how it almost always works in the real world.

you can change them in software usually. they aren't randomized though, you have the same one forever unless you override it
you send a message asking to connect to a certain access point. everyone can read the message from the air. it has your mac and the name of the access point you want to connect to. if you've previously connected to 10 different APs, you will send probes to all of them whever you go. in wpa_supplicant you can turn this shit off. i dont know what other info is in wifi, probably tons, and tons of PII

Shit, am I safe if I don't use Ethernet?

Nigger, that was a joke.
en.wikipedia.org/wiki/Medium_access_control

Nigger, so was I

Fuck off here, we don't spoonfeed retards, you're not getting any pajeet points for this.

All of it. Just don't use a router

Almost everything. Physical location of IP, system brand and specs (cancer JavaScript scripts), data being transmitted to and from server and client, etc. I'd encourage you to look more into ARP spoofing if you want to learn more about MAC addresses, ARP and high level MITM attacks.

The entire OSI model from layer 1 to 7 and all most of the protocols are susceptible to man-in-the-middle and spoofing attacks, etc. You have to remember that the OSI model was created and implmented decades ago when protocols that transmitted data in plaintext was the norm. The icing on the shit-sandwich is the modern day 'web development' languages like JS and PHP that can fingerprint you when you visit a site. Most of the protocols today have SSL/TLS bolted on, which works for the most part, but E2E would be more preferable for security and some anonymity if we lived in a perfect world, but we don't.

I also forgot the mention that MAC addresses can easily be spoofed with tools like macchanger that can be used to bypass simple NAC systems or MAC address filtering with relative ease. This is how I usually bypass captive portals for free wifi by changing my MAC address to one that's already authenticated to the WAP after searching for one with the aircrack-ng suite.

Attached: elmpr58.png (721x972, 129.11K)