iPhone privacy feature hiding Wi-Fi MACs has failed to work for 3 years

“From the get-go, this feature was useless,” researcher says of feature put into iOS 14.

https://arstechnica.com/security/2023/10/iphone-privacy-feature-hiding-wi-fi-macs-has-failed-to-work-for-3-years/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

iPhones have been exposing your unique MAC despite Apple’s promises otherwise

“From the get-go, this feature was useless,” researcher says of feature put into iOS 14.

Ars Technica

@arstechnica I remember being confused the first time I looked at my router's logs after migrating from an iPhone to @GrapheneOS. I was concerned with all of the devices that had recently been connected until I realized it was randomizing my MAC address.

I then went into the config and changed it to use a dedicated MAC for that wifi network.

@adamhotep @arstechnica GrapheneOS uses a per-connection random MAC address by default instead of a per-network random address like Android and iOS. When doing that, it also uses clean DHCP state for each connection.

Can set it to use a per-network address for your own network if you prefer but routers should be able to handle having tons of devices connecting and obtaining new IP addresses. Per-network is supported mainly for people who need to work around misguided MAC-based access control.

@GrapheneOS
I like it from a simplified auditing perspective and because I can open ports for forwarding, but only with a consistent LAN IP (admittedly less useful for a phone than for a laptop)
@adamhotep It's trivial to spoof MAC addresses of other devices using a network which is why MAC filtering, etc. doesn't work. You can see the MAC addresses being used over the air.
@GrapheneOS
True but less important when the thing you're forwarding is key-based like SSH. I'm not talking about MAC filtering, I'm talking about consistent IP addresses.