Access list for mac address3/2/2023 ![]() If you use Tor, they will be able to say you used Tor, but not the content. They can get a history of MAC & IP address from logs and their NAT can keep a history of IP Address & Ports and map back to the MAC address. They can do this already without asking for your MAC, just giving them the MAC address allows them to map it to a individual easier. So from a security measure this is not great. I can then spoof your MAC address quite easily. It's not really because I can obtain your MAC address if both of us are in the same Starbucks and on the same WiFi. ![]() ![]() They may think locking down WiFi to known MAC addresses is a good security measure. Any device connecting to the WiFi will reveal their MAC address, based on the ARP protocol. I think you should ask why they want to use the MAC address, not necessarily for privacy reasons "why do you need the MAC Address?" I think it's a reasonable question to ask them.įirstly, they will have MAC addresses of all the individuals who connect to the WiFi.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |