master
RightToPrivacy 2022-09-20 09:30:49 -04:00
parent e91ef94ee7
commit 12a6176c04
3 changed files with 16 additions and 12 deletions

View File

@ -16,7 +16,7 @@ Just run the install.sh and answer the simple questions to let wipri take care o
* NEW * wipri-eth0.service, wipri-eth0-usb.service are additional example service files helping you manage multiple devices. Instructions provided within .service files
* NEW * the -w flag (optional) allows you to leave home anytime and wipri will turn off radio to prevent (potential) leaks once you are no longer within range of your saved networks (to prevent SSID leaks)
* NEW * the -w flag (optional) allows you to leave home anytime and wipri will automatically turn off radio to prevent (potential) leaks once you are no longer within range of your saved networks (to prevent SSID leaks)
(use the -w flag anytime, either by itself (always use -d flag to set device), or combined with other flags [like -p, -m, -r, -i, etc])
@ -40,6 +40,8 @@ After this you can add additional mac addresses to your list anytime, by running
And like I said, it's easy to automate this "set random mac from your wipri-list list" by answering install.sh running with wipri-list -s eth0 command.
*Other Uses For wipri-list*: wipri-list will set a static single mac, if only one is on its list. If you add additional using -a, wipri-list will choose
one inside the list at random each run, or boot (if you install it to use wipri-list at boot).*
---
Personal: It's up to you how you want to use it. I personally like setting permanent protective wipri service commands for wifi, and enjoy wipri-list inside my wipri-eth0.service file to maintain a quasi-perm ethernet mac (you can make it change every boot if you like, or keep recognized spoofed macs, generated automatically for you)
@ -105,7 +107,7 @@ wipri -d [device] -r [randomizes mac continually changing times/addresses] -a [c
-d sets your device (use this flag always).
-w optional flag helps prevent SSID leaks (saved SSID's) - by watching wifi and turning radio off after 3min no connections
-w optional flag helps prevent SSID leaks (saved SSID's) - by watching wifi and turning radio off after 8min timeout (optional)
-r continually randomizes your mac address at randomly generated, continually changing random MAC addresses/times.
@ -166,7 +168,7 @@ DISABLING WIPRI AT BOOT (IF YOU INSTALLED AND WISH TO STOP IT/DISABLE IT)
### Additional Info:
wipri generated mac addresses use valid OUI's (unlike many mac randomizations). See below for why.
wipri generated mac addresses use valid OUI's (unlike some mac randomizations). See below for why.
If using a Linux phone / device, I suggest selecting -p for home, -P for out. To mimic an iPhone/Android phone: one of the most common devices around. -p for static (w/mac checking to prevent leaks), -P for continually changing Apple/Android mac at continuously changing times/mac addresses.
For even more broad randomization use -r for continuously changing randomization at continuously changing randomized times (all brands) or -i for static random mac identity
@ -187,17 +189,17 @@ $turnipv6 variable to 'on'.
Another concern I've had with some other mac address randomization options is the commonly used "keep the real OUI".
I understand the WHY behind this method. But personally don't want to follow it for my own devices. Example: what if in the history of a device, your new install were to leak the permanent mac somewhere?
I understand the WHY behind this. Personally decided against for my own devices. Example: what if in the history of a device, your new install were to leak the permanent mac somewhere?
If the permanent OUI is being used, and logged, how might this become a risk of linking the 'spoofed' to the permanent (same REAL hardware OUI - narrows it down quite a bit)
If the permanent OUI were used, and logged, how might this become a risk of linking itself to the 'spoofed' to the permanent (same REAL hardware OUI - narrows it down quite a bit)
I layout concerns here on some of why I chose what I did for WiPri: https://youtu.be/291uohokEOQ?t=166
Some of the thought process behind wipri https://youtu.be/291uohokEOQ?t=166
---
### ❤️ TUTORIALS + SUPPORT:
### TUTORIALS + SUPPORT:
☕ READ TUTORIALS / BUY ME A COFFEE: https://buymeacoffee.com/politictech (+ current btc addy, most posts completely public or will become public)
☕ READ TUTORIALS / BUY ME A COFFEE: https://buymeacoffee.com/politictech
❤️ MONERO: 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
@ -215,7 +217,7 @@ GITEA ONION (ANONYMOUS GIT SERVICE: ADD YOUR PROJECTS OR CONTRIBUTE!): http://gg
🔐 💾 ANON PASTEBIN (PRIVATEBIN 🧅 TOR SERVICE): http://ikgybpx6kltqcnox3tv3zhw7zw3ig7f3jfjo6ypojpmoys7q4hcf2gid.onion/paste/ ('burn after reading', self destruct options, AES 256bit encrypted "zero knowledge-snark" (not even host can read pastes), password protection. For Community Use (ethical usage only)
🤝 🎁 EXTRAS / SUPPORT: https://buymeacoffee.com/politictech/extras (download custom creations to help support this work: privacy linux "supporter images" like Pihole Adblocking Router img W/Rand Identifiers + RTPBOX "Privacybox" pi image: automated Nextcloud hid service + onion router + RPITX radio transmitter combo + consulting options + more)
🤝 🎁 EXTRAS / SUPPORT: https://buymeacoffee.com/politictech/extras
---

View File

@ -1,6 +1,8 @@
#!/bin/bash
#
# For easy Tails setup (wipri)
# NOTICE: THIS IS NOT READY - NEEDS MORE TESTING
# (WILL WORK ON THIS AGAIN AS I GET TIME - OTHERS WELCOME TO CONTRIBUTE)
# Tails setup (wipri)
#
# righttoprivacy[at]tutanota.com
#

View File

@ -22,8 +22,8 @@ DefaultDependencies=no
# Feel free to change wipri commands below to meet your needs/wants
[Service]
Type=simple
ExecStart=wipri -d wlan0 -p
ExecReload=killall -9 wipri;wipri -d wlan0 -p
ExecStart=wipri -d wlan0 -w -p
ExecReload=killall -9 wipri;wipri -d wlan0 -w -p
ExecStop=killall -9 wipri
Restart=on-failure
RemainAfterExit=no