Bug #15237

EXPOSED MAC ADDRESS ON ALL INTERFACES (controversial development in TAILS)

Added by humanrightsdefender 2018-01-24 13:03:11 . Updated 2018-01-27 14:14:29 .

Status:
Duplicate
Priority:
Urgent
Assignee:
Category:
Spoof MAC
Target version:
Start date:
2018-01-24
Due date:
% Done:

0%

Feature Branch:
Type of work:
Code
Blueprint:

Starter:
0
Affected tool:
Deliverable for:

Description

LET ME HELP YOU TO REMEMBER!

I HAVE OPENED A TICKET RELATING TO SPOOFING WHICH WAS CENSORED! NOW I OPEN ANOTHER AND I REQUEST TO PUSH A SECURITY UPDATE URGENTLY WITH THE FIX NOT ONLY ON WLAN0 BUT ON ETH0 ALSO!

ISSUE: https://labs.riseup.net/code/issues/15208

Do NOT try to explain why exposing the half of the permanent MAC address and the original manufacturer is good… because that is obviously bullshit!

In fact controversial!

Let me help all of you to remember:

<code class="text">


Tails is a live DVD or live USB that aims at preserving your privacy and anonymity.

It helps you to:

    use the Internet anonymously almost anywhere you go and on any computer: all connections to the Internet are forced to go through the Tor network;
    leave no trace on the computer you're using unless you ask it explicitly;
    use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.

    Homepage: https://tails.boum.org/
</code>

There is NO EXCUSE for exposing the half of the permanent MAC address and the real manufacturer! Nothing can justify such thing in TAILS!


Subtasks


Related issues

Is duplicate of Tails - Feature #7038: Randomize full MAC address Rejected 2014-04-07
Is duplicate of Tails - Feature #7078: Make it clear in MAC spoofing documentation that only the non-vendor bits are randomized? Rejected 2014-04-12

History

#1 Updated by humanrightsdefender 2018-01-24 13:10:52

If the issue not fixed urgently I will issue a press statement condeming Tails developers for exposing the permanent MAC address in all interfaces with information related to the manufacturer. Unacceptable such behaviour from Tails dev!

#2 Updated by intrigeri 2018-01-24 13:30:20

  • is duplicate of Feature #7038: Randomize full MAC address added

#3 Updated by intrigeri 2018-01-24 13:30:24

  • is duplicate of Feature #7078: Make it clear in MAC spoofing documentation that only the non-vendor bits are randomized? added

#4 Updated by intrigeri 2018-01-24 13:34:19

  • Status changed from New to Duplicate
  • Affected tool deleted (Security Check)

Again, as already explained on Bug #15208#note-7, this is a duplicate of Feature #7038. It’s clear that for you the answer is obvious but we don’t make decisions based on who can shout the loudest “it’s obvious!”: we need actual research, facts and data we can analyze. Next step there is to do the research about the pros/cons of spoofing the entire MAC address vs. leaving the OUI alone. Once this has been done we can weight them and make a decision. Thanks for your attention.

#5 Updated by humanrightsdefender 2018-01-24 14:02:49

*Sure according to you let just die human rights activists and human rights defenders because you and your team have no fucking clue how important is to FULLY ANONYMIZE MAC! I and my team from now on abandon the use of Tails and switching to Qubes OS and Kali Linux where this is not a problem. Tails with this move archived that WE DONT DONATE!
Until this not fixed we maintain our proposal for a press release condeming Tails wich will be done in a few days since the issue is LIFE OR DEATH!*

#6 Updated by intrigeri 2018-01-24 15:04:48

> I and my team from now on abandon the use of Tails and switching to Qubes OS and Kali Linux where this is not a problem.

I’m glad you’ve found other technical solutions that fit your needs better.

#7 Updated by humanrightsdefender 2018-01-27 14:13:21

[ This comment failed to comply with our code of conduct thus it was replaced by this message ]

#8 Updated by humanrightsdefender 2018-01-27 14:14:29

[ This comment failed to comply with our code of conduct thus it was replaced by this message ]