• Re: battery charging

    From sms@21:1/5 to badgolferman on Sat May 20 10:28:20 2023
    XPost: misc.phone.mobile.iphone

    On 5/20/2023 5:29 AM, badgolferman wrote:
    nospam <nospam@nospam.invalid> wrote:
    In article <u498g4$r8pt$1@dont-email.me>, badgolferman
    <REMOVETHISbadgolferman@gmail.com> wrote:

    What is the purpose of MAC address randomization? To spoof a piece of
    hardware?

    mac addresses can be used to track people.

    if a device provides a random one each time, then it eliminates that as
    a viable method.


    I highly doubt the vast majority of iPhone users know or use such a
    function. In other words “it’s not needed” and “not used” yet Apple has
    decided to include that in their devices. If they do research on what
    people want and need how did they come up with this feature when there are
    so many others they’ve removed which people actually want?

    You don't have to do anything. it's automatic unless you disable it, on
    both Android an iOS.

    "In late 2019, Google released Android 10 which made MAC randomization
    the default behavior when both scanning for wireless networks and
    connecting to them. This was a major change that was intended to prevent tracking across networks." <https://blog.elevensoftware.com/how-mac-address-randomization-can-affect-the-wifi-experience>

    "In iOS 14 [released on September 16, 2020] or later, and iPadOS 14 or
    later, and watchOS 7 or later, when an iPhone, iPad, iPod touch, or
    Apple Watch connects to a Wi-Fi network, it identifies itself with a
    unique (random) MAC address per network. This feature can be disabled
    either by the user or using a new option in the Wi-Fi payload." <https://support.apple.com/guide/security/wi-fi-privacy-secb9cb3140c/web>

    That first article also explains the changes that were made since
    Android 8 and iOS 8: "For many years now, most operating systems (iOS
    8+, Android 8+, Windows 10, etc.) have implemented some form of MAC randomization. However, most of these operating systems only use a
    randomized MAC address when scanning for access points and SSIDs (known
    as probe requests), but still have used a consistent, genuine MAC
    address when actually connecting to networks. This has successfully
    mitigated some forms of tracking (footfall tracking in retail stores for example), but more advanced tracking methods have surfaced since these
    changes were introduced. In late 2019, Google released Android 10 which
    made MAC randomization the default behavior when both scanning for
    wireless networks and connecting to them. This was a major change that
    was intended to prevent tracking across networks.

    Not sure where are favorite troll got the idea that iOS 14 had this
    feature prior to Android 10, or he's simply lying (again).

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Incubus@21:1/5 to sms on Sat May 20 17:47:55 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20, sms <scharf.steven@geemail.com> wrote:
    I highly doubt the vast majority of iPhone users know or use such a
    function. In other words "it's not needed" and "not used" yet Apple has
    decided to include that in their devices. If they do research on what
    people want and need how did they come up with this feature when there are >> so many others they've removed which people actually want?

    You don't have to do anything. it's automatic unless you disable it, on
    both Android an iOS.

    On Android, the mac randomization _per network_ is an automatic on setting.
    But Android mac randomization _per connection_ is a manual on/off setting.

    Does iOS have that more advanced "Wi-Fi-Enhanced MAC randomization"
    capability or is iOS still using the less advanced "per network" method?

    https://www.techrepublic.com/videos/android-11-how-to-enable-enhanced-randomize-mac-addresses/

    "In iOS 14 [released on September 16, 2020] or later, and iPadOS 14 or
    later, and watchOS 7 or later, when an iPhone, iPad, iPod touch, or
    Apple Watch connects to a Wi-Fi network, it identifies itself with a
    unique (random) MAC address per network. This feature can be disabled
    either by the user or using a new option in the Wi-Fi payload." <https://support.apple.com/guide/security/wi-fi-privacy-secb9cb3140c/web>

    That implies that iOS 14 only has the less advanced per network setting.
    Not the more advanced per connection capability of Android 11 and up.

    https://wifihelp.arista.com/post/analysis-of-mac-randomization-schemes-in-wifi-clients#section-8

    That first article also explains the changes that were made since
    Android 8 and iOS 8: "For many years now, most operating systems (iOS
    8+, Android 8+, Windows 10, etc.) have implemented some form of MAC randomization. However, most of these operating systems only use a
    randomized MAC address when scanning for access points and SSIDs (known
    as probe requests), but still have used a consistent, genuine MAC
    address when actually connecting to networks. This has successfully
    mitigated some forms of tracking (footfall tracking in retail stores for example), but more advanced tracking methods have surfaced since these changes were introduced. In late 2019, Google released Android 10 which
    made MAC randomization the default behavior when both scanning for
    wireless networks and connecting to them. This was a major change that
    was intended to prevent tracking across networks.

    The much more advanced per connection mac randomization came about in
    Android 11 but it seems like iOS is well behind in this kind of safety.

    https://www.techrepublic.com/article/how-to-enable-enhanced-randomize-mac-addresses-on-android/

    Not sure where are favorite troll got the idea that iOS 14 had this
    feature prior to Android 10, or he's simply lying (again).

    Does iOS 16 have thaat per connection enhanced wi-fi mac randomization yet?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to scharf.steven@geemail.com on Sat May 20 13:59:30 2023
    XPost: misc.phone.mobile.iphone

    In article <u4avvo$14ilf$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:


    "In iOS 14 [released on September 16, 2020] or later, and iPadOS 14 or
    later, and watchOS 7 or later, when an iPhone, iPad, iPod touch, or
    Apple Watch connects to a Wi-Fi network, it identifies itself with a
    unique (random) MAC address per network. This feature can be disabled
    either by the user or using a new option in the Wi-Fi payload." <https://support.apple.com/guide/security/wi-fi-privacy-secb9cb3140c/web>

    you conveniently skipped the first paragraph:

    Wi-Fi MAC address randomization support is available on iPhone 5 or
    later.

    iphone 5 cannot run ios 14. it stops at ios 10.

    mac address randomization was added with ios 8 in 2014. that's *before*
    google added it to android in 2017, which your first link confirms.

    since words confuse you, here's a graph which clearly shows that apple
    did it *before* android and then updated it again, before android: <https://blog.elevensoftware.com/hs-fs/hubfs/images/blog/mac-randomizati on-timeline.png?width=1325&name=mac-randomization-timeline.png>

    further information: <https://appleinsider.com/articles/14/06/09/mac-address-randomization-jo ins-apples-heap-of-ios-8-privacy-improvements>
    Beginning with iOS 8, Apple's handheld devices will generate and use
    random Media Acccess Control, or MAC, addresses rather than their
    real MAC address when scanning for Wi-Fi access points. The change
    was announced in a closed session at the company's Worldwide
    Developers Conference and first called out by security researcher
    Frederic Jacobs.


    Not sure where are favorite troll got the idea that iOS 14 had this
    feature prior to Android 10, or he's simply lying (again).

    from *your* links, along with an additional link.

    rule of holes: stop digging.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Umberto@21:1/5 to nospam on Sat May 20 20:10:21 2023
    XPost: misc.phone.mobile.iphone

    On 20/05/2023 19:59, nospam wrote:

    <https://appleinsider.com/articles/14/06/09/mac-address-randomization-jo ins-apples-heap-of-ios-8-privacy-improvements>
    Beginning with iOS 8, Apple's handheld devices will generate and use
    random Media Acccess Control, or MAC, addresses rather than their
    real MAC address *when scanning* for Wi-Fi access points. The change
    was announced in a closed session at the company's Worldwide
    Developers Conference and first called out by security researcher
    Frederic Jacobs.

    What that says is not what you seem to be thinking that says if your goal
    is to say that iOS mac randomization was earlier than its Android partner.

    What that says is iOS 8 added mac randomization *when scanning*.
    Maybe you didn't know that scanning & connecting are two different things?

    When did iOS add the mac randomization *when connecting*?
    And, did iOS ever add the better mac randomization upon *each connection*?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Umberto on Sat May 20 11:11:28 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20 11:10, Umberto wrote:
    On 20/05/2023 19:59, nospam wrote:

    <https://appleinsider.com/articles/14/06/09/mac-address-randomization-jo
    ins-apples-heap-of-ios-8-privacy-improvements>
      Beginning with iOS 8, Apple's handheld devices will generate and use
      random Media Acccess Control, or MAC, addresses ‹ rather than their
      real MAC address ‹*when scanning* for Wi-Fi access points. The change
      was announced in a closed session at the company's Worldwide
      Developers Conference and first called out by security researcher
      Frederic Jacobs.

    What that says is not what you seem to be thinking that says if your goal
    is to say that iOS mac randomization was earlier than its Android partner.

    What that says is iOS 8 added mac randomization *when scanning*.
    Maybe you didn't know that scanning & connecting are two different things?

    When did iOS add the mac randomization *when connecting*?
    And, did iOS ever add the better mac randomization upon *each connection*?

    Stop changing nyms, Arlen

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan@21:1/5 to Umberto on Sat May 20 11:28:39 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20 11:19, Umberto wrote:
    On 20/05/2023 23:41, Alan wrote:

    When did iOS add the mac randomization *when connecting*?
    And, did iOS ever add the better mac randomization upon *each
    connection*?

    Stop changing nyms, Arlen

    Who the fuck is Arlen and who the fuck are you?

    Damn iOS whiny crybabies hate that iOS copied Android mac randomization and Apple still hasn't caught up yet because iOS can't randomize connections.

    plonk!

    Your writing style is unmistakable, Arlen.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Umberto@21:1/5 to Alan on Sat May 20 20:19:17 2023
    XPost: misc.phone.mobile.iphone

    On 20/05/2023 23:41, Alan wrote:

    When did iOS add the mac randomization *when connecting*?
    And, did iOS ever add the better mac randomization upon *each connection*?

    Stop changing nyms, Arlen

    Who the fuck is Arlen and who the fuck are you?

    Damn iOS whiny crybabies hate that iOS copied Android mac randomization and Apple still hasn't caught up yet because iOS can't randomize connections.

    plonk!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to canaliumberto@impresatrecolli.com on Sat May 20 14:25:51 2023
    XPost: misc.phone.mobile.iphone

    In article <u4b2u9$1k2h$1@news.mixmin.net>, Umberto <canaliumberto@impresatrecolli.com> wrote:


    When did iOS add the mac randomization *when connecting*?
    And, did iOS ever add the better mac randomization upon *each connection*?

    Stop changing nyms, Arlen

    Who the fuck is Arlen and who the fuck are you?

    Damn iOS whiny crybabies hate that iOS copied Android mac randomization and Apple still hasn't caught up yet because iOS can't randomize connections.

    plonk!

    you're not fooling anyone.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to canaliumberto@impresatrecolli.com on Sat May 20 14:17:45 2023
    XPost: misc.phone.mobile.iphone

    In article <u4b2dh$1ftj$1@news.mixmin.net>, Umberto <canaliumberto@impresatrecolli.com> wrote:


    When did iOS add the mac randomization *when connecting*?

    2018, a year *before* android.

    <https://blog.elevensoftware.com/hs-fs/hubfs/images/blog/mac-randomizati on-timeline.png>

    that graphic is from sms's link.

    it's always helpful when people provide links that refute what they are
    arguing about. it saves others a lot of time.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Umberto@21:1/5 to nospam on Sat May 20 20:39:20 2023
    XPost: misc.phone.mobile.iphone

    On 20/05/2023 20:25, nospam wrote:

    you're not fooling anyone.

    Who the fuck are you? And what the fuck do you know about Android?

    You're just another sniffling iOS whiny crybaby who hates that Appple
    copied Android mac randomization and Apple still hasn't caught up yet
    because iOS still can't randomize the mac address on each connection.

    I'm not even going to respond to the rest of these iOS crybabies.
    Fup set to the android newsgroup only.

    Fucking iOS whiny crybabies.
    plonk!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Umberto on Sat May 20 18:56:29 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20, Umberto <canaliumberto@impresatrecolli.com> wrote:
    On 20/05/2023 23:41, Alan wrote:

    When did iOS add the mac randomization *when connecting*? And, did
    iOS ever add the better mac randomization upon *each connection*?

    Stop changing nyms, Arlen

    Who the fuck is Arlen and who the fuck are you?

    You're not fooling anyone, old fart. : )

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to sms on Sat May 20 18:53:10 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20, sms <scharf.steven@geemail.com> wrote:

    That first article also explains the changes that were made since
    Android 8 and iOS 8: "For many years now, most operating systems (iOS
    8+, Android 8+, Windows 10, etc.) have implemented some form of MAC randomization.

    Not sure where are favorite troll got the idea that iOS 14 had this
    feature prior to Android 10, or he's simply lying (again).

    Anyone with a web browser and a couple brain cells to rub together can
    look on Wikipedia to see that in fact nospam is correct:

    * iOS 8 was released on September 16, 2015.
    * Android 8 was released on August 21, 2017, *two* *years* later.

    You're the troll spreading disinformation here. ; )

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Umberto on Sat May 20 18:58:52 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20, Umberto <canaliumberto@impresatrecolli.com> wrote:
    On 20/05/2023 20:25, nospam wrote:

    you're not fooling anyone.

    Who the fuck are you?

    *YAWN* Get back on your meds, Arlen.

    I'm not even going to respond to the rest of these iOS crybabies.

    Yes you will. And you'll nym switch and impersonate others while doing
    it. That's been your modus operandi for years.

    Fup set to the android newsgroup only.

    Don't cross post to the iOS newsgroups in the first place if you don't
    like being corrected by iOS users, asshole.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to nospam on Sat May 20 19:01:38 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20, nospam <nospam@nospam.invalid> wrote:
    In article <u4b2dh$1ftj$1@news.mixmin.net>, Umberto
    <canaliumberto@impresatrecolli.com> wrote:

    When did iOS add the mac randomization *when connecting*?

    2018, a year *before* android.

    <https://blog.elevensoftware.com/hs-fs/hubfs/images/blog/mac-randomization-timeline.png>

    that graphic is from sms's link.

    it's always helpful when people provide links that refute what they
    are arguing about. it saves others a lot of time.

    Indeed. Of course the littler sms, badgolferman, and Arlen troll clique definitely won't admit they are wrong about this, just like they have
    refused to even acknowledge all the other things they got completely
    wrong, because: troll. ; )

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to jollyroger@pobox.com on Sat May 20 16:30:10 2023
    XPost: misc.phone.mobile.iphone

    In article <kcsj8lFbhvvU1@mid.individual.net>, Jolly Roger <jollyroger@pobox.com> wrote:

    On 2023-05-20, sms <scharf.steven@geemail.com> wrote:
    That first article also explains the changes that were made since
    Android 8 and iOS 8: "For many years now, most operating systems (iOS
    8+, Android 8+, Windows 10, etc.) have implemented some form of MAC randomization.

    Not sure where are favorite troll got the idea that iOS 14 had this
    feature prior to Android 10, or he's simply lying (again).

    Anyone with a web browser and a couple brain cells to rub together can
    look on Wikipedia to see that in fact nospam is correct:

    * iOS 8 was released on September 16, 2015.

    that's ios 9.

    ios 8 was released on sep 14, 2014, with developer previews starting in
    june, 2014.

    * Android 8 was released on August 21, 2017, *two* *years* later.

    three years.

    it's actually worse :)

    You're the troll spreading disinformation here. ; )

    yep.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to scharf.steven@geemail.com on Sat May 20 19:12:37 2023
    XPost: misc.phone.mobile.iphone

    In article <u4bj6a$1773u$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:

    Yes, that's what nospam doesn't understand. But to be fair, this is a
    very technical issue that you can't expect those unfamiliar with network technology to comprehend.

    ad hominem. insults are all you have.

    your own link proves you wrong, which means it's *you* who doesn't
    understand.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Umberto on Sat May 20 15:56:10 2023
    XPost: misc.phone.mobile.iphone

    On 5/20/2023 11:10 AM, Umberto wrote:
    On 20/05/2023 19:59, nospam wrote:

    <https://appleinsider.com/articles/14/06/09/mac-address-randomization-jo
    ins-apples-heap-of-ios-8-privacy-improvements>
      Beginning with iOS 8, Apple's handheld devices will generate and use
      random Media Acccess Control, or MAC, addresses ‹ rather than their
      real MAC address ‹*when scanning* for Wi-Fi access points. The change
      was announced in a closed session at the company's Worldwide
      Developers Conference and first called out by security researcher
      Frederic Jacobs.

    What that says is not what you seem to be thinking that says if your goal
    is to say that iOS mac randomization was earlier than its Android partner.

    What that says is iOS 8 added mac randomization *when scanning*.
    Maybe you didn't know that scanning & connecting are two different things?

    <snip>

    Yes, that's what nospam doesn't understand. But to be fair, this is a
    very technical issue that you can't expect those unfamiliar with network technology to comprehend.

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Bob Campbell@21:1/5 to nospam on Sat May 20 23:56:54 2023
    XPost: misc.phone.mobile.iphone

    nospam <nospam@nospam.invalid> wrote:
    In article <u4b2dh$1ftj$1@news.mixmin.net>, Umberto <canaliumberto@impresatrecolli.com> wrote:


    When did iOS add the mac randomization *when connecting*?

    2018, a year *before* android.

    <https://blog.elevensoftware.com/hs-fs/hubfs/images/blog/mac-randomizati on-timeline.png>

    that graphic is from sms's link.

    it's always helpful when people provide links that refute what they are arguing about. it saves others a lot of time.

    Am I missing something here? The link above says that in:

    2014, iOS 8 adds MAC randomization when scanning.

    2017, Android 8 adds MAC randomization when scanning.

    2018, Android 9 adds full MAC randomization when connecting as a default disabled setting.

    2019, Android 10 adds full MAC randomization when connecting as a default enabled setting. However, the randomized MAC stays consistent per SSID.

    2020, iOS 14 adds full MAC randomization when connecting as a default
    enabled setting, in addition to rotating the randomized MAC address every
    24 hours.

    So, iOS had MAC randomization when scanning 3 years before Android. But, Android had MAC randomization when connecting 1 year (or 2 years if we
    count the default disabled setting) before iOS. Assuming this info is
    current, iOS has better MAC randomization right now, due to the “rotating
    the randomized MAC address every 24 hours. “

    I don’t see any entry for iOS doing anything in 2018.

    The point is, iOS was first for some things. Android was first for some things. What exactly are we arguing about? Isn’t this what competition
    is all about? We all get better products. Right?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to Campbell on Sat May 20 20:01:26 2023
    XPost: misc.phone.mobile.iphone

    In article <BladncWPobLbw_T5nZ2dnZfqnPGdnZ2d@supernews.com>, Bob
    Campbell <nunya@none.none> wrote:


    The point is, iOS was first for some things. Android was first for some things.

    correct, however, ios is first for many more things than android.

    What exactly are we arguing about? Isnt this what competition
    is all about? We all get better products. Right?

    yep.

    different companies have different priorities.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to nospam on Sat May 20 23:25:41 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20, nospam <nospam@nospam.invalid> wrote:
    In article <kcsj8lFbhvvU1@mid.individual.net>, Jolly Roger
    <jollyroger@pobox.com> wrote:
    On 2023-05-20, sms <scharf.steven@geemail.com> wrote:
    That first article also explains the changes that were made since
    Android 8 and iOS 8: "For many years now, most operating systems
    (iOS 8+, Android 8+, Windows 10, etc.) have implemented some form
    of MAC randomization.

    Not sure where are favorite troll got the idea that iOS 14 had this
    feature prior to Android 10, or he's simply lying (again).

    Anyone with a web browser and a couple brain cells to rub together
    can look on Wikipedia to see that in fact nospam is correct:

    * iOS 8 was released on September 16, 2015.

    that's ios 9.

    ios 8 was released on sep 14, 2014, with developer previews starting
    in june, 2014.

    Whoops. Good catch. Accidentally copied the wrong date from Wikipedia.
    Thanks for the correction.

    * Android 8 was released on August 21, 2017, *two* *years* later.

    three years.

    it's actually worse :)

    Right.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Jolly Roger on Sun May 21 03:55:03 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20 20:58, Jolly Roger wrote:
    On 2023-05-20, Umberto <canaliumberto@impresatrecolli.com> wrote:
    On 20/05/2023 20:25, nospam wrote:

    you're not fooling anyone.

    Who the fuck are you?

    *YAWN* Get back on your meds, Arlen.

    I'm not even going to respond to the rest of these iOS crybabies.

    Yes you will. And you'll nym switch and impersonate others while doing
    it. That's been your modus operandi for years.

    Fup set to the android newsgroup only.

    Don't cross post to the iOS newsgroups in the first place if you don't
    like being corrected by iOS users, asshole.

    He is not Arlen. Arlen enjoys pissing you and would not remove the
    iphone groups.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to sms on Sun May 21 03:57:52 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-20 19:28, sms wrote:
    On 5/20/2023 5:29 AM, badgolferman wrote:
    nospam <nospam@nospam.invalid> wrote:
    In article <u498g4$r8pt$1@dont-email.me>, badgolferman
    <REMOVETHISbadgolferman@gmail.com> wrote:

    What is the purpose of MAC address randomization? To spoof a piece of
    hardware?

    mac addresses can be used to track people.

    if a device provides a random one each time, then it eliminates that as
    a viable method.


    I highly doubt the vast majority of iPhone users know or use such a
    function. In other words “it’s not needed” and “not used” yet Apple has
    decided to include that in their devices. If they do research on what
    people want and need how did they come up with this feature when there
    are
    so many others they’ve removed which people actually want?

    You don't have to do anything. it's automatic unless you disable it, on
    both Android an iOS.

    "In late 2019, Google released Android 10 which made MAC randomization
    the default behavior when both scanning for wireless networks and
    connecting to them. This was a major change that was intended to prevent tracking across networks." <https://blog.elevensoftware.com/how-mac-address-randomization-can-affect-the-wifi-experience>

    Notice that MAC randomization will make connections not to work at some
    places. Those that look at the MAC before authorizing you to connect.

    So, it is not always a good feature.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter@21:1/5 to Jolly Roger on Sun May 21 05:05:19 2023
    XPost: misc.phone.mobile.iphone

    Jolly Roger <jollyroger@pobox.com> wrote:
    Anyone with a web browser and a couple brain cells to rub together can
    look on Wikipedia to see that in fact nospam is correct:

    He was wrong because he wasn't aware there is a difference between
    randomizing while scanning, when connecting and per each connection.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Incubus@21:1/5 to Bob Campbell on Sun May 21 03:41:02 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-21, Bob Campbell <nunya@none.none> wrote:
    Am I missing something here? The link above says that in:

    2014, iOS 8 adds MAC randomization when scanning.

    2017, Android 8 adds MAC randomization when scanning.

    2018, Android 9 adds full MAC randomization when connecting as a default disabled setting.

    2019, Android 10 adds full MAC randomization when connecting as a default enabled setting. However, the randomized MAC stays consistent per SSID.

    2020, iOS 14 adds full MAC randomization when connecting as a default
    enabled setting, in addition to rotating the randomized MAC address every
    24 hours.

    So, iOS had MAC randomization when scanning 3 years before Android. But, Android had MAC randomization when connecting 1 year (or 2 years if we
    count the default disabled setting) before iOS. Assuming this info is current, iOS has better MAC randomization right now, due to the "rotating
    the randomized MAC address every 24 hours. "

    I don't see any entry for iOS doing anything in 2018.

    The point is, iOS was first for some things. Android was first for some things. What exactly are we arguing about? Isn't this what competition
    is all about? We all get better products. Right?

    I think there is only one person "arguing" about which came first.
    Nobody else seems to care if one came before the other. It's not a race.

    Each platform often has good ideas that the other platform borrows from.
    That's good for everyone.

    I didn't double check your timeline (it looked fine to me) but I noticed
    only one thing wrong which is that even in Android 11 and above, the mac randomization per BSSID connection is never set as the default setting.

    Only the Android mac randomization per BSSID is what's set as the default.
    For Android, you only get the random mac per connection if you turn it on.

    The way Apple does it with a 24-hour rotation is different than how Android does it per each connection but you can likely say the results are similar.

    For Android, if you connect twice to the same hotspot in the same day,
    you'll get two different mac randomizations & for iOS it will be only one.

    Given that Android randomizes more intelligently than iOS does, you can't
    say iOS randomizing the mac every 24 hours is any better than Android randomizing the mac upon every single connection - but other than that one feature difference with Android being better - they are about the same.

    Thank you for outlining the history of mac randomization on smartphones.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Michael@21:1/5 to Patron Saint on Sat May 20 22:26:02 2023
    XPost: misc.phone.mobile.iphone

    On Sun, 21 May 2023 12:16:18 +0800, Patron Saint wrote:

    Notice that MAC randomization will make connections not to work at some
    places. Those that look at the MAC before authorizing you to connect.

    So, it is not always a good feature.

    This is why the Android 11 MAC randomization per connection (Android) or
    MAC randomization per day (iOS) is a feature you can turn on & off at will.

    If you turn randomization on prior to connecting to a hotspot, they can
    save your MAC address on that first connect. If you come back a couple of hours later you will be a different MAC on Android but the same MAC on iOS.

    You'll only get a different MAC address on iOS 24 hours later.

    For some things (like hotel authentication by MAC address) you may want to turn off the Android per-connection randomization and the iOS per-day randomization so that you keep the same MAC address the whole hotel stay.

    Mac randomization can also affect home routers when using address
    reservation (some people refer to it as a static ip address) for the phone.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Patron Saint@21:1/5 to Carlos E.R. on Sun May 21 12:16:18 2023
    XPost: misc.phone.mobile.iphone

    Carlos E.R. wrote on 21.05.2023 09:57

    Notice that MAC randomization will make connections not to work at some places. Those that look at the MAC before authorizing you to connect.

    So, it is not always a good feature.

    This is why the Android 11 MAC randomization per connection (Android) or
    MAC randomization per day (iOS) is a feature you can turn on & off at will.

    If you turn randomization on prior to connecting to a hotspot, they can
    save your MAC address on that first connect. If you come back a couple of
    hours later you will be a different MAC on Android but the same MAC on iOS.

    You'll only get a different MAC address on iOS 24 hours later.

    For some things (like hotel authentication by MAC address) you may want to
    turn off the Android per-connection randomization and the iOS per-day randomization so that you keep the same MAC address the whole hotel stay.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Michael on Sun May 21 13:08:50 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-21 06:26, Michael wrote:
    On Sun, 21 May 2023 12:16:18 +0800, Patron Saint wrote:

    Notice that MAC randomization will make connections not to work at some
    places. Those that look at the MAC before authorizing you to connect.

    So, it is not always a good feature.

    This is why the Android 11 MAC randomization per connection (Android) or
    MAC randomization per day (iOS) is a feature you can turn on & off at will. >>
    If you turn randomization on prior to connecting to a hotspot, they can
    save your MAC address on that first connect. If you come back a couple of
    hours later you will be a different MAC on Android but the same MAC on iOS. >>
    You'll only get a different MAC address on iOS 24 hours later.

    For some things (like hotel authentication by MAC address) you may want to >> turn off the Android per-connection randomization and the iOS per-day
    randomization so that you keep the same MAC address the whole hotel stay.

    Mac randomization can also affect home routers when using address
    reservation (some people refer to it as a static ip address) for the phone.

    Indeed. I use this feature.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Patron Saint on Sun May 21 13:08:55 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-21 06:16, Patron Saint wrote:
    Carlos E.R. wrote on 21.05.2023 09:57

    Notice that MAC randomization will make connections not to work at
    some places. Those that look at the MAC before authorizing you to
    connect.

    So, it is not always a good feature.

    This is why the Android 11 MAC randomization per connection (Android) or
    MAC randomization per day (iOS) is a feature you can turn on & off at will. If you turn randomization on prior to connecting to a hotspot, they can
    save your MAC address on that first connect. If you come back a couple of hours later you will be a different MAC on Android but the same MAC on iOS.

    You'll only get a different MAC address on iOS 24 hours later.

    Meaning, at some friends of mine, you will be unable to connect. They
    expect you to have the same MAC for years.

    For some things (like hotel authentication by MAC address) you may want to turn off the Android per-connection randomization and the iOS per-day randomization so that you keep the same MAC address the whole hotel stay.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Carlos E.R. on Sun May 21 06:52:27 2023
    XPost: misc.phone.mobile.iphone

    On 5/20/2023 6:57 PM, Carlos E.R. wrote:

    <snip>

    Notice that MAC randomization will make connections not to work at some places. Those that look at the MAC before authorizing you to connect.

    So, it is not always a good feature.

    I haven't encountered that on either my iPhone or my iPad (or my Android devices) but you can always turn randomization off if it's an issue you encounter.

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to scharf.steven@geemail.com on Sun May 21 11:42:10 2023
    XPost: misc.phone.mobile.iphone

    In article <u4dd5r$1km0a$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:

    I don't even remember posting what nospam claims I said about
    randomization and the timeline.

    you definitely did, which is why i mentioned it. you were oblivious
    that apple had it in 2014, six years earlier than you originally
    claimed.

    Why he brought up the issue is a
    mystery, especially since Android was actually first with MAC
    randomization when connecting.

    you're trying to weasel out of admitting you were wrong by moving the
    goalposts and claiming it's now about connecting.

    the fact is, as supported by your own links, that apple was first in
    2014.

    you also have yet to admit you were wrong about everything else for
    which you've been proven wrong, including everyone's favourite, face id
    in the dark.

    As an aside, with TMAC you can spoof the MAC address on Windows
    machines. This can be useful at times.

    for illicit purposes.

    it can also be done on mac os, without the need for any third party
    utility.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Incubus on Sun May 21 08:25:47 2023
    XPost: misc.phone.mobile.iphone

    On 5/20/2023 8:41 PM, Incubus wrote:

    I think there is only one person "arguing" about which came first.
    Nobody else seems to care if one came before the other. It's not a race.

    I don't even remember posting what nospam claims I said about
    randomization and the timeline. Why he brought up the issue is a
    mystery, especially since Android was actually first with MAC
    randomization when connecting.

    As an aside, with TMAC you can spoof the MAC address on Windows
    machines. This can be useful at times.

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Incubus@21:1/5 to sms on Sun May 21 18:39:46 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-21, sms <scharf.steven@geemail.com> wrote:
    I don't even remember posting what nospam claims I said about
    randomization and the timeline. Why he brought up the issue is a
    mystery, especially since Android was actually first with MAC
    randomization when connecting.

    I think that confusion about who was first with what is because some
    posters don't appear to have known there is a difference in the timelines between scanning, connection, and re-connecting mac randomizations.

    But really, who cares who was first as long as the phone uses an easily
    turned on intelligent algorithm.

    I don't know why Apple chose an arbitrary 24-hour time period since nobody plans their connections based on such things so I would consider Apple's time-based remix to be substandard to a connection-based randomization.

    I don't have an iPhone but you can maybe force a randomization if you wipe
    out the saved Wi-Fi settings to any given SSID & reboot & do it all over.

    But that would be a pain so I consider the Android method more intelligent.

    As an aside, with TMAC you can spoof the MAC address on Windows
    machines.

    Thanks for the TMAC suggestion as I was unaware of that Windows program.

    Technitium MAC Address Changer
    A freeware utility to spoof MAC address instantly
    https://technitium.com/tmac/ https://download.technitium.com/tmac/TMACv6.0.7_Setup.zip

    Since about the Windows 2000, there has been this simple standalone app. https://www.gorlani.com/software/download/MacMakeup.zip

    MacMakeup comes with a small OUI database for intelligent randomizations. https://standards-oui.ieee.org/oui/oui.txt

    MacMakeup also works from the command line which people use for automation.

    This can be useful at times.

    The Gorlani site lists a few reasons the author knows for the advantages. https://www.gorlani.com/software/mmkup.php

    Here's a list of what the author mentioned but there are other advantages.

    "I recently discovered that TeamViewer seems to use the MAC address to identify your device and decide whether or not you're making "commercial"
    use of the software. Just google for it.

    Another use of a new MAC address if to make passive fingerprinting/profile building more difficult. Several network software or appliances nowadays
    try to build "profiles" of network devices. Having layer 2 information is considered (?) more solid than layer 3 addresses that change often,
    especially when DHCPs are involved.

    Talking about DHCP, they tend to re-assign IPs to known MAC addresses, so
    you may just need a different IP to test something, despite the DHCP intentions.

    On a WiFi network you may find that only some MAC addresses are allowed by
    the access points, so you can borrow one of them taking care o to use it
    when the owners are online.

    During several pen-testing acts you may need to create specific MAC
    addresses, or discard used ones for new ones.

    As I said before, some licensing schemes consider your MAC as the unique identifier to bind a specific license. I would normally say you must not
    use this method to bypass some sort of licensing, but since it is very
    stupid it may be an incentive for people to find better protection
    algorythms.

    You may spoof addresses on your devices to make it simpler to distinguish
    their traffic, for example when capturing traffic on busy networks (you can create "your own" OIDs).

    You can just want a MAC that is easy to remember (or funny, just google for those)."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to nospam on Sun May 21 22:36:45 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-21, nospam <nospam@nospam.invalid> wrote:
    In article <u4dd5r$1km0a$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:

    I don't even remember posting what nospam claims I said about
    randomization and the timeline.

    the fact is, as supported by your own links, that apple was first in
    2014.

    you also have yet to admit you were wrong about everything else for
    which you've been proven wrong, including everyone's favourite, face
    id in the dark.

    And note the deafening silence on this topic from badgolferman as well,
    despite so often objecting to anyone noticing they are all in the same
    clique as Arlen. ; )

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Patron Saint@21:1/5 to Carlos E.R. on Mon May 22 07:04:36 2023
    XPost: misc.phone.mobile.iphone

    Carlos E.R. wrote on 21.05.2023 05:08

    You'll only get a different MAC address on iOS 24 hours later.

    Meaning, at some friends of mine, you will be unable to connect. They
    expect you to have the same MAC for years.

    If you turn off all MAC randomization, you will have the same MAC for
    years, but then you can be more easily tracked when scanning & connecting.

    For a while even Apple was very confused as to what method they'd use. https://www.extremenetworks.com/extreme-networks-blog/wi-fi-mac-randomization-privacy-and-collateral-damage/

    I don't think their 24-hour method has any merit though in the real world.
    What use do you see for the 24-hour method over a new MAC on each connect?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Incubus on Sun May 21 22:38:55 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-21, Incubus <u9536612@gmail.com> wrote:
    On 2023-05-21, sms <scharf.steven@geemail.com> wrote:

    I don't even remember posting what nospam claims I said about
    randomization and the timeline. Why he brought up the issue is a
    mystery, especially since Android was actually first with MAC
    randomization when connecting.

    But really, who cares who was first as long as the phone uses an
    easily turned on intelligent algorithm.

    sms cares - he's the one who first mentioned (incorrectly) that Android
    was supposedly first, as part of his low-effort troll. ; )

    [Typical Arlen-style wall of text rightfully ignored.]

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Michael@21:1/5 to Carlos E.R. on Sun May 21 16:50:58 2023
    XPost: misc.phone.mobile.iphone

    On Sun, 21 May 2023 13:08:50 +0200, Carlos E.R. wrote:

    Mac randomization can also affect home routers when using address
    reservation (some people refer to it as a static ip address) for the phone.

    Indeed. I use this feature.

    I do too where my old Netgear router insists on having a static Mac address
    in order to do what the router calls "Address Reservation" to give each
    phone on the LAN the same IP address each time I boot any one phone up.

    I need a static IP address on the phone because I have scripts which are
    easier to write if I always know the IP address of each phone on the LAN.

    Since I can't use address reservation on the router with a constantly
    changing Mac address, one option is to not turn on the randomization per connection - which means the first randomization per SSID is what it uses.

    In this manner it seems the Android randomization is more sophisticated.

    What works surprisingly well is to allow the Mac randomization per each connection to any given SSID but to set the IP address as "static" on the
    phone itself in the connection settings for that Wi-Fi SSID access point.

    It's "address reservation" if you do it from the router's side of things,
    but it's "static IP addresses" if you do the same thing on the phone side.

    It's very easy to do on Android and the result is exactly what you'd want.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From RonTheGuy@21:1/5 to Jolly Roger on Sun May 21 15:17:48 2023
    XPost: misc.phone.mobile.iphone

    On May 21, 2023, Jolly Roger wrote
    (in article<news:kcvkrvFpupsU2@mid.individual.net>):

    But really, who cares who was first as long as the phone uses an
    easily turned on intelligent algorithm.

    sms cares - he's the one who first mentioned (incorrectly) that Android
    was supposedly first, as part of his low-effort troll. ; )

    It was nospam who cared but he was wrong because it's obvious he wasn't
    aware there is a difference between scanning vs connecting mac addresses.

    I'm sure he will "say" he was aware, but the instant you read what nospam wrote, it's obvious he whooshed entirely that sms was talking about the connection mac and not the scanning mac which was all nospam knew about.

    Probably because Apple didn't advertise it was much later than Android was.

    Ron, the humblest guy in town.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to michael@spamcop.com on Sun May 21 19:35:02 2023
    XPost: misc.phone.mobile.iphone

    In article <u4e77m$221c$1@nnrp.usenet.blueworldhosting.com>, Michael <michael@spamcop.com> wrote:

    Since I can't use address reservation on the router with a constantly changing Mac address, one option is to not turn on the randomization per connection - which means the first randomization per SSID is what it uses.

    use the native mac address.

    In this manner it seems the Android randomization is more sophisticated.

    it seems you know nothing about networking.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to RonTheGuy on Mon May 22 00:29:52 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-21, RonTheGuy <ron@null.invalid> wrote:
    On May 21, 2023, Jolly Roger wrote
    (in article<news:kcvkrvFpupsU2@mid.individual.net>):

    But really, who cares who was first as long as the phone uses an
    easily turned on intelligent algorithm.

    sms cares - he's the one who first mentioned (incorrectly) that
    Android was supposedly first, as part of his low-effort troll. ; )

    It was nospam

    Nope, sms is on record being the very first person (incorrectly)
    claiming who was first. Others responded correcting his disinformation,
    but he was indeed the one who cared enough to mention it in the first
    place.

    Ron, the most dishonest guy in town.

    Yes.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From badgolferman@21:1/5 to Jolly Roger on Mon May 22 04:24:39 2023
    XPost: misc.phone.mobile.iphone

    Jolly Roger <jollyroger@pobox.com> wrote:
    On 2023-05-21, nospam <nospam@nospam.invalid> wrote:
    In article <u4dd5r$1km0a$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:

    I don't even remember posting what nospam claims I said about
    randomization and the timeline.

    the fact is, as supported by your own links, that apple was first in
    2014.

    you also have yet to admit you were wrong about everything else for
    which you've been proven wrong, including everyone's favourite, face
    id in the dark.

    And note the deafening silence on this topic from badgolferman as well, despite so often objecting to anyone noticing they are all in the same
    clique as Arlen. ; )


    Classic trolling technique. Stop trying to involve me in a topic I don’t
    care about.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Joerg Lorenz@21:1/5 to All on Mon May 22 07:44:50 2023
    XPost: misc.phone.mobile.iphone

    Am 22.05.23 um 01:35 schrieb nospam:
    In article <u4e77m$221c$1@nnrp.usenet.blueworldhosting.com>, Michael <michael@spamcop.com> wrote:

    Since I can't use address reservation on the router with a constantly
    changing Mac address, one option is to not turn on the randomization per
    connection - which means the first randomization per SSID is what it uses.

    use the native mac address.

    In this manner it seems the Android randomization is more sophisticated.

    it seems you know nothing about networking.

    +1; works perfectly here. It is not particularly clever to interfere
    with the Apple randomization and the DHCP-server.

    --
    Gutta cavat lapidem (Ovid)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Patron Saint on Mon May 22 11:45:44 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22 01:04, Patron Saint wrote:
    Carlos E.R. wrote on 21.05.2023 05:08

    You'll only get a different MAC address on iOS 24 hours later.

    Meaning, at some friends of mine, you will be unable to connect. They
    expect you to have the same MAC for years.

    If you turn off all MAC randomization, you will have the same MAC for
    years, but then you can be more easily tracked when scanning & connecting.

    I only connect at home.

    And distant webservers do not get to see the MAC, it is not routed.


    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to badgolferman on Mon May 22 13:37:09 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22, badgolferman <REMOVETHISbadgolferman@gmail.com> wrote:
    Jolly Roger <jollyroger@pobox.com> wrote:
    On 2023-05-21, nospam <nospam@nospam.invalid> wrote:
    In article <u4dd5r$1km0a$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:

    I don't even remember posting what nospam claims I said about
    randomization and the timeline.

    the fact is, as supported by your own links, that apple was first in
    2014.

    you also have yet to admit you were wrong about everything else for
    which you've been proven wrong, including everyone's favourite, face
    id in the dark.

    And note the deafening silence on this topic from badgolferman as
    well, despite so often objecting to anyone noticing they are all in
    the same clique as Arlen. ; )

    Stop trying to involve me in a topic I don’t care about.

    Yes, that's the point. You never care about sms's and Arlen's trolling activities. In fact, you willingly participate in them. ; )

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Patron Saint@21:1/5 to All on Mon May 22 23:24:25 2023
    XPost: misc.phone.mobile.iphone

    On Mon, 22 May 2023 11:45:44 +0200, Carlos E.R. wrote:
    Carlos E.R. wrote on 22.05.2023 15:15>>>> You'll only get a different MAC address on iOS 24 hours later.

    Meaning, at some friends of mine, you will be unable to connect. They
    expect you to have the same MAC for years.

    If you turn off all MAC randomization, you will have the same MAC for
    years, but then you can be more easily tracked when scanning & connecting.

    I only connect at home.

    Are you aware that you're still _scanning_ even when you're away from home.
    And some phones still scan even when the Wi-Fi looks like it's turned off?

    If you take your phone outside your home, you need to consider this issue.

    And distant webservers do not get to see the MAC, it is not routed.

    Nobody is talking about "distant webservers" in this random mac scenario.
    It is the phone itself which is scanning/connecting to a local Wi-Fi AP.

    The issue is when you walk near or into a location that is saving your mac address (such as at a store, or a hotspot, or at the Capitol or whatever).

    There are many steps you can take if you leave your Wi-Fi turned on - such
    as mac randomization and/or not connecting to open hotspots and/or not re-connecting to a known access point and/or turning off Wi-Fi geofencing.

    But without those methods (which requires you understand how it all works),
    the only other way out of that mac address data collection is to turn off
    your Wi-Fi completely - but on some setups - even then it's _still_
    scanning (if you don't know how to turn those harder to find settings off).

    Or, leave your phone at home & you won't have to worry about this issue.


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to RonTheGuy on Mon May 22 09:07:21 2023
    XPost: misc.phone.mobile.iphone

    On 5/21/2023 4:17 PM, RonTheGuy wrote:

    <snip>

    It was nospam who cared but he was wrong because it's obvious he wasn't
    aware there is a difference between scanning vs connecting mac addresses.

    Correct. It's an easy mistake to make for those not familiar with
    network technology.

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Patron Saint on Mon May 22 09:06:08 2023
    XPost: misc.phone.mobile.iphone

    On 5/21/2023 4:04 PM, Patron Saint wrote:

    <snip>

    I don't think their 24-hour method has any merit though in the real world. What use do you see for the 24-hour method over a new MAC on each connect?

    It's possible that Google has a patent on the feature that generates a
    new MAC address on each connect. There's no logical reason for the "24
    hour method."

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to scharf.steven@geemail.com on Mon May 22 12:11:42 2023
    XPost: misc.phone.mobile.iphone

    In article <u4g3ti$276k7$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:


    It's possible that Google has a patent on the feature

    no, and that excuse is getting quite old. you use it for just about
    everything.

    the patent office has a search function. put up or shut up.

    that generates a
    new MAC address on each connect. There's no logical reason for the "24
    hour method."

    yes there is.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Patron Saint on Mon May 22 19:00:19 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22 17:24, Patron Saint wrote:
    On Mon, 22 May 2023 11:45:44 +0200, Carlos E.R. wrote:
    Carlos E.R. wrote on 22.05.2023 15:15>>>> You'll only get a different MAC address on iOS 24 hours later.

    Meaning, at some friends of mine, you will be unable to connect.
    They expect you to have the same MAC for years.

    If you turn off all MAC randomization, you will have the same MAC for
    years, but then you can be more easily tracked when scanning &
    connecting.

    I only connect at home.

    Are you aware that you're still _scanning_ even when you're away from home. And some phones still scan even when the Wi-Fi looks like it's turned off?

    Yes, I am aware.

    If you take your phone outside your home, you need to consider this issue.

    And distant webservers do not get to see the MAC, it is not routed.

    Nobody is talking about "distant webservers" in this random mac scenario.
    It is the phone itself which is scanning/connecting to a local Wi-Fi AP.

    The issue is when you walk near or into a location that is saving your mac address (such as at a store, or a hotspot, or at the Capitol or whatever).

    And you really think that people are collecting MACs in their public
    routers, if they are not connecting to them?

    Over here, that is possibly illegal, so I do not have to care.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Java Jive@21:1/5 to sms on Mon May 22 17:53:06 2023
    XPost: misc.phone.mobile.iphone

    On 22/05/2023 17:06, sms wrote:

    It's possible that Google has a patent on the feature that generates a
    new MAC address on each connect.

    I don't see how possibly they could have, MAC spoofing has been around
    since forever, and ...

    https://en.wikipedia.org/wiki/MAC_spoofing

    "MAC Address Randomization in WiFi

    To prevent third parties from using MAC addresses to track devices,
    Android, Linux, iOS, and Windows[6] have implemented MAC address
    randomization. In June 2014, Apple announced that future versions of iOS
    would randomize MAC addresses for all WiFi connections. The Linux kernel
    has supported MAC address randomization during network scans since March 2015,[7] but drivers need to be updated to use this feature.[8] Windows
    has supported it since the release of Windows 10[6] in July 2015."

    ... so everyone's doing it, which suggests that it's not been patented.

    --

    Fake news kills!

    I may be contacted via the contact address given on my website:
    www.macfh.co.uk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to sms on Mon May 22 10:02:59 2023
    XPost: misc.phone.mobile.iphone

    On 5/22/2023 9:06 AM, sms wrote:
    On 5/21/2023 4:04 PM, Patron Saint wrote:

    <snip>

    I don't think their 24-hour method has any merit though in the real
    world.
    What use do you see for the 24-hour method over a new MAC on each
    connect?

    It's possible that Google has a patent on the feature that generates a
    new MAC address on each connect. There's no logical reason for the "24
    hour method."

    So reading more about this issue, it's not clear about the "24 hour randomization." It was a beta feature and what it apparently did was to randomize the MAC address every 24 hours when a device remain connected
    (or reconnected) to a Wi-Fi network.

    It appears that if you disconnected than reconnected to the same Wi-Fi
    network within the same 24 hour period then a new MAC address was not generated. See <https://www.techrepublic.com/article/how-to-manage-or-disable-mac-randomization-in-ios-and-ipados-14/>.

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Java Jive on Mon May 22 10:05:43 2023
    XPost: misc.phone.mobile.iphone

    On 5/22/2023 9:53 AM, Java Jive wrote:
    On 22/05/2023 17:06, sms wrote:

    It's possible that Google has a patent on the feature that generates a
    new MAC address on each connect.

    I don't see how possibly they could have, MAC spoofing has been around
    since forever, and ...

    https://en.wikipedia.org/wiki/MAC_spoofing

    "MAC Address Randomization in WiFi

    To prevent third parties from using MAC addresses to track devices,
    Android, Linux, iOS, and Windows[6] have implemented MAC address randomization. In June 2014, Apple announced that future versions of iOS would randomize MAC addresses for all WiFi connections. The Linux kernel
    has supported MAC address randomization during network scans since March 2015,[7] but drivers need to be updated to use this feature.[8] Windows
    has supported it since the release of Windows 10[6] in July 2015."

    ... so everyone's doing it, which suggests that it's not been patented.

    Who knows what patents get through the USPO? Remember, what Android did
    is significantly different than what Apple did with iOS in 2014.
    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Java Jive@21:1/5 to sms on Mon May 22 18:22:16 2023
    XPost: misc.phone.mobile.iphone

    On 22/05/2023 18:05, sms wrote:

    Who knows what patents get through the USPO?

    Conspiracy defence, but just because I can't disprove it doesn't mean
    that I don't know that it's bollocks.

    --

    Fake news kills!

    I may be contacted via the contact address given on my website:
    www.macfh.co.uk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to java@evij.com.invalid on Mon May 22 13:41:53 2023
    XPost: misc.phone.mobile.iphone

    In article <u4g6lk$27fcv$1@dont-email.me>, Java Jive
    <java@evij.com.invalid> wrote:

    On 22/05/2023 17:06, sms wrote:
    It's possible that Google has a patent on the feature that generates a
    new MAC address on each connect.

    I don't see how possibly they could have, MAC spoofing has been around
    since forever, and ...

    ...

    ... so everyone's doing it, which suggests that it's not been patented.

    there are no patents for it. full stop.

    he trots out that same old excuse out whenever he's been cornered.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to robin_listas@es.invalid on Mon May 22 13:41:56 2023
    XPost: misc.phone.mobile.iphone

    In article <3mjsjjx6kj.ln2@Telcontar.valinor>, Carlos E.R. <robin_listas@es.invalid> wrote:


    And you really think that people are collecting MACs in their public
    routers, if they are not connecting to them?

    some people definitely do that to track visitors, which is the reason
    why randomization is a thing.

    Over here, that is possibly illegal, so I do not have to care.

    how could it possibly be illegal?

    you're transmitting that information into their equipment located on
    their property.

    if they were actively snooping, that would be different. they're not.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to scharf.steven@geemail.com on Mon May 22 13:41:57 2023
    XPost: misc.phone.mobile.iphone

    In article <u4g7d7$27ft8$2@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:


    Who knows what patents get through the USPO?

    those who search their database.

    your excuse is bullshit and you know it.

    Remember, what Android did
    is significantly different than what Apple did with iOS in 2014.

    no it isn't, but at least you finally admit that apple did it before
    android did.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Java Jive on Mon May 22 11:11:29 2023
    XPost: misc.phone.mobile.iphone

    On 5/22/2023 10:22 AM, Java Jive wrote:
    On 22/05/2023 18:05, sms wrote:

    Who knows what patents get through the USPO?

    Conspiracy defence, but just because I can't disprove it doesn't mean
    that I don't know that it's bollocks.

    Not at all. If you look at many of the patents that mobile device
    companies have been granted they include "...on a mobile device..."
    where the feature in question had long been available on other devices.

    It appears that the "24 hour" thing was to automatically generate a new
    MAC address even when a user was using the same Wi-Fi network (whether
    they never disconnected or whether they reconnected to the same network
    without changing the MAC address), whereas Android would generate a new
    MAC address every time the user connected, whether they had been
    previously connected to that Wi-Fi network or not, but would not
    generate a new MAC address if the user remained connected to the same
    Wi-Fi network.

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to scharf.steven@geemail.com on Mon May 22 14:22:11 2023
    XPost: misc.phone.mobile.iphone

    In article <u4gb8i$27ss0$2@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:

    On 22/05/2023 18:05, sms wrote:
    Who knows what patents get through the USPO?

    Conspiracy defence, but just because I can't disprove it doesn't mean
    that I don't know that it's bollocks.

    Not at all. If you look at many of the patents that mobile device
    companies have been granted they include "...on a mobile device..."
    where the feature in question had long been available on other devices.

    as he said, it's bollocks, and your explanation is only making it worse
    for you.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Carlos E.R. on Mon May 22 12:24:13 2023
    XPost: misc.phone.mobile.iphone

    On 5/22/2023 12:12 PM, Carlos E.R. wrote:

    <snip>

    Data protection laws, GDPR and all that.

    You are correct. "The MAC address is considered personal data in the
    GDPR, and, since it is not anonymized immediately after the collection,
    it is subject to the GDPR rules."

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to nospam on Mon May 22 21:12:10 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22 19:41, nospam wrote:
    In article <3mjsjjx6kj.ln2@Telcontar.valinor>, Carlos E.R. <robin_listas@es.invalid> wrote:


    And you really think that people are collecting MACs in their public
    routers, if they are not connecting to them?

    some people definitely do that to track visitors, which is the reason
    why randomization is a thing.

    Over here, that is possibly illegal, so I do not have to care.

    how could it possibly be illegal?

    Data protection laws, GDPR and all that.


    you're transmitting that information into their equipment located on
    their property.

    if they were actively snooping, that would be different. they're not.

    Doesn't matter.

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to robin_listas@es.invalid on Mon May 22 16:07:49 2023
    XPost: misc.phone.mobile.iphone

    In article <bdrsjjxa4u.ln2@Telcontar.valinor>, Carlos E.R. <robin_listas@es.invalid> wrote:

    And you really think that people are collecting MACs in their public
    routers, if they are not connecting to them?

    some people definitely do that to track visitors, which is the reason
    why randomization is a thing.

    Over here, that is possibly illegal, so I do not have to care.

    how could it possibly be illegal?

    Data protection laws, GDPR and all that.

    cite the relevant statute that applies.

    you're transmitting that information into their equipment located on
    their property.

    if they were actively snooping, that would be different. they're not.

    Doesn't matter.

    yes it does.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to scharf.steven@geemail.com on Mon May 22 16:07:53 2023
    XPost: misc.phone.mobile.iphone

    In article <u4gfgt$28c08$1@dont-email.me>, sms
    <scharf.steven@geemail.com> wrote:

    Data protection laws, GDPR and all that.

    You are correct. "The MAC address is considered personal data in the
    GDPR, and, since it is not anonymized immediately after the collection,
    it is subject to the GDPR rules."

    wrong. it 'can' be, but isn't always.

    <https://www.footfallcam.com/people-counting/knowledge-base/chapter-19-g eneral-data-protection-regulation-gdpr/>
    Although a MAC address is a unique identifier to identify the device,
    it is not categorised as 'personal data' because we will not be able
    to identify a certain individual without the use of additional
    information. A MAC address is tied to a device, NOT to the person.
    This means the MAC address does not disclose the device owner's
    real-world identity nor any other personal data without the use of
    additional information, such as the device holder's name. This means
    that without additional information such as the details of the SIM
    card and the registered account holder from the phone company (which
    are categorised as 'confidential information' by the phone company),
    it is nearly impossible to identify a certain individual with the MAC
    address only


    <https://seguro.ltd/news/are-mac-addresses-considered-personal-data-unde r-the-uk-gdpr/>
    The answer is as you would expect it depends on circumstance.
    ...
    ARTICLE 4(1) OF THE UK GDPR, PROVIDES THE DEFINITIONS, AND STATES
    THAT PERSONAL DATA IS ANY INFORMATION THAT DIRECTLY OR INDIRECTLY
    RELATES TO AN IDENTIFIED OR IDENTIFIABLE INDIVIDUAL. FOR EXAMPLE,
    THEIR NAME, LOCATION DATA OR AN ONLINE IDENTIFIER. RECITAL 30 OF THE
    UK GDPR EXPANDS ON THIS AND GIVES EXAMPLES OF ONLINE IDENTIFIERS SUCH
    AS COOKIE IDENTIFIERS, IP ADDRESSES AND ALSO MAC ADDRESSES.

    MAC ADDRESSES MAY BE PERSONAL DATA BUT ARE NOT NECESSARILY ALWAYS
    PERSONAL DATA. IT DEPENDS ON THE CIRCUMSTANCES.

    IT WILL BECOME PERSONAL DATA IF THE MAC ADDRESS CAN BE LINKED TO
    OTHER INFORMATION THAT YOUR ORGANISATION HOLDS WHICH RESULTS IN
    THE INDIVIDUAL BEING DISTINGUISHED FROM OTHER INDIVIDUALS AND
    IDENTIFIABLE. FOR EXAMPLE, THERE MAY BE A SIGN-IN PROCESS FOR THE
    PASSENGER AND YOUR ORGANISATION KEEPS A RECORD OF THE SIGN-IN
    INFORMATION. IN THIS INSTANCE, IT IS LIKELY THAT THE MAC ADDRESS
    LINKED WITH THE ADDITIONAL SIGN-IN INFORMATION WILL BECOME PERSONAL
    DATA.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to sms on Mon May 22 20:17:23 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22, sms <scharf.steven@geemail.com> wrote:

    Who knows what patents get through the USPO?

    Patents are public, clown. 🤣

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to sms on Mon May 22 20:16:30 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22, sms <scharf.steven@geemail.com> wrote:
    On 5/21/2023 4:04 PM, Patron Saint wrote:

    <snip>

    I don't think their 24-hour method has any merit though in the real
    world. What use do you see for the 24-hour method over a new MAC on
    each connect?

    It's possible that Google has a patent

    "It must be patented or something" is sms's go-to reason for just about everything... 🤡

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to sms on Mon May 22 20:39:23 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22, sms <scharf.steven@geemail.com> wrote:
    On 5/21/2023 4:17 PM, RonTheGuy wrote:

    <snip>

    It was nospam who cared but he was wrong because it's obvious he
    wasn't aware there is a difference between scanning vs connecting mac
    addresses.

    Correct.

    Nope, you are the one who first claimed Android did it first and that
    Apple copied Android.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Java Jive@21:1/5 to sms on Mon May 22 22:00:30 2023
    XPost: misc.phone.mobile.iphone

    On 22/05/2023 19:11, sms wrote:

    Not at all. If you look at many of the patents that mobile device
    companies have been granted they include "...on a mobile device..."
    where the feature in question had long been available on other devices.

    If you want to convince, give an actual example.

    --

    Fake news kills!

    I may be contacted via the contact address given on my website:
    www.macfh.co.uk

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Oscar Mayer@21:1/5 to Carlos E.R. on Mon May 22 17:18:10 2023
    XPost: misc.phone.mobile.iphone

    On Mon, 22 May 2023 11:45:44 +0200, Carlos E.R. wrote:

    You'll only get a different MAC address on iOS 24 hours later.

    Meaning, at some friends of mine, you will be unable to connect. They
    expect you to have the same MAC for years.

    If you turn off all MAC randomization, you will have the same MAC for
    years, but then you can be more easily tracked when scanning & connecting.

    I only connect at home.

    And distant webservers do not get to see the MAC, it is not routed.

    Are you sure distant servers do not see & save the MAC of your phone? https://www.samsung.com/us/account/privacy-policy/

    Information we may collect automatically includes information about
    your device,
    including MAC address,
    IP address,
    log information,
    device model,
    hardware model,
    IMEI number,
    serial number,
    subscription information,
    device settings,
    connections to other devices,
    mobile network operator,
    web browser characteristics,
    app usage information,
    sales code,
    access code,
    current software version,
    MNC,
    subscription information,
    Personalized Service ID (or PSID),
    and advertising IDs,
    including Google Ad ID;

    And that was only the bullet item which started with your MAC address.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to jollyroger@pobox.com on Mon May 22 17:27:38 2023
    XPost: misc.phone.mobile.iphone

    In article <kd20suF6fiqU2@mid.individual.net>, Jolly Roger <jollyroger@pobox.com> wrote:

    On 2023-05-22, sms <scharf.steven@geemail.com> wrote:
    It's possible that Google has a patent

    "It must be patented or something" is sms's go-to reason for just about everything... ?

    it is, and one way you know he's bullshitting (more so than usual).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Patron Saint@21:1/5 to sms on Tue May 23 05:37:51 2023
    XPost: misc.phone.mobile.iphone

    On Mon, 22 May 2023 10:02:59 -0700, sms wrote:

    So reading more about this issue, it's not clear about the "24 hour randomization." It was a beta feature and what it apparently did was to randomize the MAC address every 24 hours when a device remain connected
    (or reconnected) to a Wi-Fi network.

    It appears that if you disconnected than reconnected to the same Wi-Fi network within the same 24 hour period then a new MAC address was not generated. See <https://www.techrepublic.com/article/how-to-manage-or-disable-mac-randomization-in-ios-and-ipados-14/>.

    I brought that lack of clarity up when I posted this older iOS 14 beta data https://www.extremenetworks.com/extreme-networks-blog/wi-fi-mac-randomization-privacy-and-collateral-damage/

    What's needed is clarity on how iOS 16 does the mac randomization when scanning, connecting to any given SSID and especially when re-connecting.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Patron Saint@21:1/5 to nospam on Tue May 23 05:39:05 2023
    XPost: misc.phone.mobile.iphone

    On Mon, 22 May 2023 12:11:42 -0400, nospam wrote:

    It's possible that Google has a patent on the feature

    no, and that excuse is getting quite old. you use it for just about everything.

    I don't see any indication it's a patent issue.
    It's more likely a design choice but it's not clear it even exists.

    For a while even Apple was very confused as to what method they'd use. https://www.extremenetworks.com/extreme-networks-blog/wi-fi-mac-randomization-privacy-and-collateral-damage/


    the patent office has a search function. put up or shut up.

    The only logical reason I can see for a specific time period is that
    sometimes you can pay for a Wi-Fi connection for a specific time period.

    But then the time period would be settable if that was Apple's goal.


    that generates a
    new MAC address on each connect. There's no logical reason for the "24
    hour method."

    yes there is.

    What is it?

    It's a smarter implementation to allow users to turn mac randomization on
    or off & then if on, to change the phone's mac address on every connect.

    All the better if they can set a time period but nobody seems to have that.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Carlos E.R.@21:1/5 to Oscar Mayer on Mon May 22 23:47:09 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-22 23:18, Oscar Mayer wrote:
    On Mon, 22 May 2023 11:45:44 +0200, Carlos E.R. wrote:

    You'll only get a different MAC address on iOS 24 hours later.

    Meaning, at some friends of mine, you will be unable to connect.
    They expect you to have the same MAC for years.

    If you turn off all MAC randomization, you will have the same MAC for
    years, but then you can be more easily tracked when scanning &
    connecting.

    I only connect at home.

    And distant webservers do not get to see the MAC, it is not routed.

    Are you sure distant servers do not see & save the MAC of your phone? https://www.samsung.com/us/account/privacy-policy/

    I'm certain that routers do not pass the MAC. If servers see it, it is
    not from the packets metadata, has to be some other way. Web scripting
    perhaps.

    My Apache log doesn't have the MACs

    --
    Cheers, Carlos.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to patron@saint.com on Mon May 22 18:14:16 2023
    XPost: misc.phone.mobile.iphone

    In article <u4gnct$3o2ke$1@novabbs.org>, Patron Saint
    <patron@saint.com> wrote:

    For a while even Apple was very confused as to what method they'd use.

    baseless claim. they were not confused in the least.

    the patent office has a search function. put up or shut up.

    The only logical reason I can see for a specific time period is that sometimes you can pay for a Wi-Fi connection for a specific time period.

    that's one reason, and a very obvious one.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to robin_listas@es.invalid on Mon May 22 18:14:17 2023
    XPost: misc.phone.mobile.iphone

    In article <tf4tjjxbjr.ln2@Telcontar.valinor>, Carlos E.R. <robin_listas@es.invalid> wrote:


    And distant webservers do not get to see the MAC, it is not routed.

    Are you sure distant servers do not see & save the MAC of your phone? https://www.samsung.com/us/account/privacy-policy/

    I'm certain that routers do not pass the MAC.

    they do not

    If servers see it, it is
    not from the packets metadata, has to be some other way. Web scripting perhaps

    correct.

    one reason is so that a registered device on a public access hotspot
    network can have access at any time, at any location within the
    network. it checks the mac address of the device with whatever is
    stored in the user's account info stored on the server. that way, they
    don't have to log in every time.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Patron Saint@21:1/5 to nospam on Tue May 23 06:40:58 2023
    XPost: misc.phone.mobile.iphone

    nospam wrote on 23.05.2023 03:44

    For a while even Apple was very confused as to what method they'd use.

    baseless claim.

    You are all excuses. No information.

    Besides Apple adding it & then removing it over & over, Apple's 24-hour implementation is just plain stupid - but it's still better than nothing.

    they were not confused in the least.

    Read that article and come up with a new excuse after you do so. https://www.extremenetworks.com/extreme-networks-blog/wi-fi-mac-randomization-privacy-and-collateral-damage/

    If Apple cared about time periods, they'd be settable.
    And they're not.

    So it's just a stupid implementation.


    the patent office has a search function. put up or shut up.

    The only logical reason I can see for a specific time period is that
    sometimes you can pay for a Wi-Fi connection for a specific time period.

    that's one reason, and a very obvious one.

    You are a wealth of excuses with no information backing your excuses up.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to Patron Saint on Mon May 22 19:40:44 2023
    XPost: misc.phone.mobile.iphone

    On 5/22/2023 3:40 PM, Patron Saint wrote:

    <snip>

    You are all excuses. No information.

    Besides Apple adding it & then removing it over & over, Apple's 24-hour implementation is just plain stupid - but it's still better than nothing.

    It's not clear what that 24 hour implementation actually is, or if it
    still exists.

    If the 24 hour timer still exists then it's only if you connect or
    reconnect to the same Wi-Fi network after 24 hours that the MAC address
    is re-randomized.

    I just tried it, on both iOS and Android, at work where we have four
    different Wi-Fi networks and it remembers the MAC address when you
    switch back and forth between networks, without "re-randomizing." This
    is for both iOS and Android.

    Even forgetting a network then re-entering credentials, did not change
    the randomized MAC address, nor did powering the device down then up
    then reconnecting to the same network. I'll try on Wednesday morning
    which will be more than 24 hours.

    I also found some minor advantages to Android when it comes to Wi-Fi
    networks:
    1. When entering the password on Android there's an option to display
    the password. There is no such option on iOS. Yeah, this is minor but
    when entering a password on the tiny on-screen keyboard, with big
    fingers, it's nice to be able to check that you've entered it correctly.
    I added this to the document as 224a on page 110, see <https://docs.google.com/document/d/1JznrWfGJDA8CYVfjSnPTwfVy8-gAC0kPyaApuJTcUNE/#bookmark=id.2lpgrla975qp>

    2. They properly label the MAC address as "Randomized MAC address." On
    my iPhone they just all it "Wi-Fi Address." Under the Privacy setting
    they properly label the option as "Use randomized MAC (default). On my
    iPhone it's labeled "Private Wi-Fi Address." I guess that Apple doesn't
    want to confuse it's users with a technical term like MAC address.

    --
    “If you are not an expert on a subject, then your opinions about it
    really do matter less than the opinions of experts. It's not
    indoctrination nor elitism. It's just that you don't know as much as
    they do about the subject.”—Tin Foil Awards

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From RonTheGuy@21:1/5 to Jolly Roger on Mon May 22 19:43:23 2023
    XPost: misc.phone.mobile.iphone

    On May 23, 2023, Jolly Roger wrote
    (in article<news:kd227rF6fiqU4@mid.individual.net>):

    On 2023-05-22, sms <scharf.steven@geemail.com> wrote:
    On 5/21/2023 4:17 PM, RonTheGuy wrote:

    <snip>

    It was nospam who cared but he was wrong because it's obvious he
    wasn't aware there is a difference between scanning vs connecting mac
    addresses.

    Correct.

    Nope, you are the one who first claimed Android did it first and that
    Apple copied Android.

    https://source.android.com/docs/core/connect/wifi-mac-randomization
    "Starting in Android 8.0, Android devices use randomized MAC addresses when probing for new networks while not currently associated with a network."

    That sure looks like it says nospam, Jolly Roger & Bob Campbell were wrong.

    Android 8.0 Oreo was released publicly on Aug. 21, 2017
    iOS 14 was officially released on September 16, 2020

    Ron, the humblest guy in town.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From RonTheGuy@21:1/5 to RonTheGuy on Mon May 22 20:20:31 2023
    XPost: misc.phone.mobile.iphone

    On May 22, 2023, RonTheGuy wrote
    (in article<news:7dk6aijz539f$.dlg@news.solani.org>):

    Nope, you are the one who first claimed Android did it first and that
    Apple copied Android.

    https://source.android.com/docs/core/connect/wifi-mac-randomization
    "Starting in Android 8.0, Android devices use randomized MAC addresses when probing for new networks while not currently associated with a network."

    That sure looks like it says nospam, Jolly Roger & Bob Campbell were wrong.

    Android 8.0 Oreo was released publicly on Aug. 21, 2017
    iOS 14 was officially released on September 16, 2020

    Bob Campbell corrected me.

    He was right that iOS had scanning/probing first (by 3 years) in 2014.
    Then Android had persistent random macs upon connecting first (by 1 year).
    And Android got the non-persistent mac randomization on September 8, 2020.

    There isn't any reference given for how iOS 16 handles non persistence yet.

    Ron, the humblest guy in town.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to ron@null.invalid on Tue May 23 08:44:47 2023
    XPost: misc.phone.mobile.iphone

    In article <owdwuzv44tnb.dlg@news.solani.org>, RonTheGuy
    <ron@null.invalid> wrote:


    Bob Campbell corrected me.

    everyone does.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From RonTheGuy@21:1/5 to nospam on Tue May 23 08:24:44 2023
    XPost: misc.phone.mobile.iphone

    On May 23, 2023, nospam wrote
    (in article<news:230520230844473402%nospam@nospam.invalid>):

    Bob Campbell corrected me.

    everyone does.

    You were right iOS had (by three years) probing/scanning using randomized
    mac addresses but it was obvious you didn't have any idea that Android not
    only caught up but Android was ahead of Apple (by one year) with randomized connections per access point.

    You are still unaware that Android has accelerated even further ahead of
    Apple (by at least three years so far) on randomizing the mac on each Wi-Fi connection (currently the best Apple can come up with is a 24-hour kluge).

    You got one right out of three, which is pretty good for you.

    What would be useful from you is for you to look up when Apple will finally catch up to Android on randomizing the mac on every single AP connection.

    Ron, the humblest guy in town.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to RonTheGuy on Tue May 23 19:24:24 2023
    XPost: misc.phone.mobile.iphone

    On 2023-05-23, RonTheGuy <ron@null.invalid> wrote:
    On May 23, 2023, nospam wrote
    (in article<news:230520230844473402%nospam@nospam.invalid>):

    Bob Campbell corrected me.

    everyone does.

    You were right iOS had (by three years) probing/scanning using
    randomized mac addresses but it was obvious you didn't have any idea
    that Android not only caught up

    You guys *desperately* want us all to forget that sms's original claim
    which started this whole subthread was that Android supposedly had MAC
    address randomization first (untrue) and that Apple supposedly copied it
    from Android (obviously also untrue). The minute someone dared to
    correct sms's bogus claim, the rest of you zealots gleefully piled on.
    Its all a matter of record. And here we are days later and you guys are
    still bickering about it. The amount of pure noise you people add to the internet is frankly amazing.

    Ron, the humblest guy in town.

    LOL! 🤣

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)