Bug #15237
EXPOSED MAC ADDRESS ON ALL INTERFACES (controversial development in TAILS)
0%
Description
LET ME HELP YOU TO REMEMBER!
I HAVE OPENED A TICKET RELATING TO SPOOFING WHICH WAS CENSORED! NOW I OPEN ANOTHER AND I REQUEST TO PUSH A SECURITY UPDATE URGENTLY WITH THE FIX NOT ONLY ON WLAN0 BUT ON ETH0 ALSO!
ISSUE: https://labs.riseup.net/code/issues/15208
Do NOT try to explain why exposing the half of the permanent MAC address and the original manufacturer is good… because that is obviously bullshit!
In fact controversial!
Let me help all of you to remember:
<code class="text">
Tails is a live DVD or live USB that aims at preserving your privacy and anonymity.
It helps you to:
use the Internet anonymously almost anywhere you go and on any computer: all connections to the Internet are forced to go through the Tor network;
leave no trace on the computer you're using unless you ask it explicitly;
use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.
Homepage: https://tails.boum.org/
</code>
There is NO EXCUSE for exposing the half of the permanent MAC address and the real manufacturer! Nothing can justify such thing in TAILS!
Subtasks
Related issues
Is duplicate of Tails - |
Rejected | 2014-04-07 | |
Is duplicate of Tails - |
Rejected | 2014-04-12 |
History
#1 Updated by humanrightsdefender 2018-01-24 13:10:52
If the issue not fixed urgently I will issue a press statement condeming Tails developers for exposing the permanent MAC address in all interfaces with information related to the manufacturer. Unacceptable such behaviour from Tails dev!
#2 Updated by intrigeri 2018-01-24 13:30:20
- is duplicate of
Feature #7038: Randomize full MAC address added
#3 Updated by intrigeri 2018-01-24 13:30:24
- is duplicate of
Feature #7078: Make it clear in MAC spoofing documentation that only the non-vendor bits are randomized? added
#4 Updated by intrigeri 2018-01-24 13:34:19
- Status changed from New to Duplicate
- Affected tool deleted (
Security Check)
Again, as already explained on Bug #15208#note-7, this is a duplicate of Feature #7038. It’s clear that for you the answer is obvious but we don’t make decisions based on who can shout the loudest “it’s obvious!”: we need actual research, facts and data we can analyze. Next step there is to do the research about the pros/cons of spoofing the entire MAC address vs. leaving the OUI alone. Once this has been done we can weight them and make a decision. Thanks for your attention.
#5 Updated by humanrightsdefender 2018-01-24 14:02:49
*Sure according to you let just die human rights activists and human rights defenders because you and your team have no fucking clue how important is to FULLY ANONYMIZE MAC! I and my team from now on abandon the use of Tails and switching to Qubes OS and Kali Linux where this is not a problem. Tails with this move archived that WE DONT DONATE!
Until this not fixed we maintain our proposal for a press release condeming Tails wich will be done in a few days since the issue is LIFE OR DEATH!*
#6 Updated by intrigeri 2018-01-24 15:04:48
> I and my team from now on abandon the use of Tails and switching to Qubes OS and Kali Linux where this is not a problem.
I’m glad you’ve found other technical solutions that fit your needs better.
#7 Updated by humanrightsdefender 2018-01-27 14:13:21
[ This comment failed to comply with our code of conduct thus it was replaced by this message ]
#8 Updated by humanrightsdefender 2018-01-27 14:14:29
[ This comment failed to comply with our code of conduct thus it was replaced by this message ]