Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.internet.wireless    |    Fun with wireless Internet access    |    55,960 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 55,614 of 55,960    |
|    Carlos E.R. to Marian    |
|    Re: Discussion: How to set up your mobil    |
|    02 Dec 25 13:01:00    |
      XPost: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone       From: robin_listas@es.invalid              On 2025-12-01 19:50, Marian wrote:       > Discussion:       > How to set up your mobile devices & home router for privacy/security.       >       > For those wishing to know more about this topic, most people have their       > router Wi-Fi AP set to broadcast the SSID, which means it's uploaded to       > world-wide publicly accessible databases whether they like it or not.       > a. The (unique) GPS location (of the phone uploading it) is uploaded              Not a problem.              > b. The signal strength (of the signal to the phone) is uploaded              Not a problem.              > c. The (unique) BSSID (MAC address) is uploaded - which is essentially you              Not a problem.              > d. The (normally non-unique) SSID is uploaded (with or without _nomap)              Not a problem.              Next.              ...                     > Of course, you should always disable Wi-Fi Protected Setup (WPS). Duh.              Okay. Basically the same as not using it.              > And, keep your firmware updated (duh),              My ISP does it automatically if there is a new firmware, which there is not.              & isolate the guest network (duh).              Not all routers can, or do it partially.              > Disable remote administration to your router (duh) & use HTTPS for login.              That removes the warranty. Seriously. My router is remotely managed by       my ISP. Not via plain ssh login, they have their own dedicated channel.                     >       > You "can" restrict connections by MAC, but if you're randomizing the MAC       > address, it's going to be impossible (as is static IP addresses set at the       > router level - they now have to be set at the mobile device level instead).       >       > Also enable and check the router log (duh) for intrusions, but if you've       > ever done that, you'll know already you're being attacked constantly.              The very verbose log in my router does not appear to include external       intrusions, or hits on the firewall.                            > Disable UPnP (duh), and firewall inbound traffic (duh) and enable DNS       > encryption (DoH/DoT), which seems easy, but I've found it to be a PITA.       > A. DoH (DNS over HTTPS) wraps DNS queries inside HTTPS traffic       > B. DoT (DNS over TLS) sends DNS queries over a TLS-encrypted channel                     Pse.              >       > You enable iOS 14 & up DoH using Settings > Wi-Fi > DNS & you enable       > Android 9+ DoT with Settings > Network & Internet > Advanced > Private DNS.       >       > You enable DoH on Windows in Settings > Network & Internet > Change adapter       > options > DNS settings where Windows 11 is still DoH but the GUI is better.       >       > On Android devices, you can add a system-wide firewall such as NetGuard.       > It can block Wi-Fi/CellularData access per app. Not available on iOS.       >       > I don't have much experience with RethinkDNS, but it's a FOSS Android app       > that combines encrypted DNS (DoH/DoT/DNSCrypt) with a system-wide firewall.       > i. RethinkDNS = firewall + encrypted DNS (DoH/DoT/DNSCrypt) + blocklists       > ii. NetGuard = firewall + per-app blocking + ad/tracker blocklists       >       > You'll never have any privacy/security on iOS, which sucks at both (and       > anyone thinking it doesn't suck, clearly doesn't know anything about iOS).       >       > While we're at it, it's probably a good idea to put smart TVs, cameras, and       > IoT gadgets on a separate VLAN or guest SSID, and it goes without saying       > further that you should change the rude/ignorant default iOS/Android setup.              Not viable.              >       > If your neighbor's Wi-Fi is open, Windows can BLOCK accidental connections:       > @echo off       > netsh wlan show filters       > echo Blocking unwanted Wi-Fi networks...       > REM Replace these with the SSIDs you want to hide       > netsh wlan add filter permission=block ssid="SSID1" networkt       pe=infrastructure       > netsh wlan add filter permission=block ssid="SSID2" networkt       pe=infrastructure       > netsh wlan add filter permission=block ssid="SSID3" networkt       pe=infrastructure       > echo Done! The specified SSIDs are now blocked.       > netsh wlan show filters       > pause       >       > What did I miss?                     --       Cheers, Carlos.       ES🇪🇸, EU🇪🇺;              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca