PrivacyTechPro tip: Be careful that your Wi-Fi name does not include sensitive details like your family name etc.

If so, you are just a search away from being doxxed.

Did you know the #Google Maps car also collects and catalogs wireless network names? #Microsoft and #Wigle do the same.

The good news is you can (and should) opt out.

Give your wireless network a new name with "_nomap" at the end to prevent Google from collecting your router's information.

EX: "YourWifiName_nomap"

Microsoft requires "_optout", but it can be anywhere in the network name.

If you want to block both from collecting and storing your wireless network information, this example would work.

"YourWifiName_optout_nomap"

Wigle wireless mapping service accepts both options so this format would be sufficient.

#cybersecgirl #privacytechpro #networking

Reply to this note

Please Login to reply.

Discussion

Mine's "NSA_Van_3" to spook my neighbors

So funny ETT!

an oldie but a goodie 🔥

thank you!

my pleasure

I do have GFY and GUEST_GFY

love it 🔥

This might be a dumb question, especially because I'm not a coder. How does putting nomap at the end prevent Google from picking ut up?

I assume it's just trusting Google to honor your request here? 😄

Similar to robots.txt file at the root of websites

Exactly. nostr:npub1528y9s3jg3ka6uez8xctzl9yq6ppkp6zmxe9ud6dttuv94ndrffqer2m8n has a point. In this case, hiding the SSID might be enough.

But still, Google and Microsoft will use whatever the NSA is demanding and I'm sure they track at least mac addresses of devices connected to the hidden AP

it's not perfect, but opting out it is better than doing nothing. hiding your ssid is also a good option, but again not perfect, there are plenty of tools that identify hidden networks. privacy through layers of obscurity is the name of the game here. i could write a chapter here, but this post is focussed on one simple "win" that will increase privacy.

They do pick them up, how else would they know there's a trigger word in the name. Then the WiFi search processes noticed the trigger word combination and if programed honestly, they ignore such WiFi names.

But it's not really #optOut because we still need to trust them they'll really ignore them. I bet #NSA demanded to store all of them in secret.

Opting out for real would mean no wireless connections in your home or on you. No WiFi router, no Bluetooth, no turned on wifi on your mobile devices etc.

Speaking about Bluetooth... Some time ago a showed some OSINT magic to Flipper users in a discord channel who bragged about them, posting pictures of a device and sometimes even publicly disclose the #FlipperZero device name.

Most of them could be easily geolocated.

How, #Wigle does not only store wifi AP but also Bluetooth and if you type in wigle Bluetooth search the device name you can in many cases see where the device is located.

They were clueless where I get the information from and demand I take down the data 🤣

TikTok hackers Canada fear the most

https://wigle.net is a great tool for #OSINT

So, what have we learned? Disconect from the wireless world of smart devices to ❌ OptOut gor real.

i recommend using the official "opt out" line. it should be set, if not, you did not officially "opt out". and if you want, you can choose to hide your ssid as well. i think it is a bit of overkill and anyone with wireshark, for example can find your "hidden" ssid.

if you have an open source hardware firewall running pfsense or opnsense (with vpn installed on firewall) connected to an open source router (travel routers are great since the signal usually doesn't reach the road) with openwrt or dd-wrt you should be well protected, just remember spoof your mac address before connecting it to your isp's modem the first time.

even better if you choose to not use wifi, but this is threat model dependent.

it is their official "opt out" of this indicator. it's not perfect, but it absolutely should be set.

There is a setting "Hide SSID" in AP web configuration. Does it have the same effect?

It hides the AP which in Google, wiggle, Microsoft scaning case might be effective, but the data packages still flies around in and out and with the right tools your SSID can be unhiden and with potentially weak pasword even used for malicious purpuses.

no. i suggest using the official "opt out" line and if you want, you can choose to hide your ssid as well. i think it is a bit of overkill and anyone with wireshark, for example can find your "hidden" ssid.

if you have an open source hardware firewall running pfsense or opnsense (with vpn installed on firewall) connected to an open source router (travel routers are great since the signal usually doesn't reach the road) with openwrt or dd-wrt you should be good to go, just remember spoof your mac address before connecting it to your isp's modem the first time.

Thanks for strengthening our privacy 💜

thank you 💜

Hmm... that does seem like drawing their attention to yourself... Perhaps routers need to have those appended by default so we blend in.

What about just changing it occassionally?

Judging by the street view images, their car does not come more often than once every 3-4 years...

Can you explain how this works if I ad _optout_nomap to the Wi-Fi?

"This trick is already pretty old and has been around since 2011, when Google was forced to create an opt-out solution after data collection concerns in the EU, following the introduction of Street View in Germany. Google also notes that the "_nomap" opt-out is only valid for its own location service, so other companies could continue collecting your Wi-Fi network's position despite the suffix. For example, Microsoft requires you to include "_optout" somewhere in your SSID, so you'd need to create an ID such as "1234_optout_nomap" to reject both services."

Thank you for the explanation

yw

Thanks

We need hierarchical deterministic WiFi names.