To connect to a WiFi hotspot, devices send out a probe request to available network access points (APs) in their surroundings. An available network sends a probe response, initiating the connection. While this process is standard, these requests “also serve as a means to track, trilaterate [locate], and identify devices for attackers who passively sniff network traffic,” the paper said.
So probe requests reveal your physical address to hackers by way of triangulation. Wow, it's not enough to condemn these fuckers or label them as perverts, but you've got to protect yourself beyond the standard tools that come built in on your device.
17:56. So if you have your phone on for example if I go in my Wi-Fi settings on my phone first it lists all the Wi-Fi spots that are available nearby also on your phone you know how when you go and visit your parents house it just automatically connects to the Wi-Fi why does it do that because your phone stores a list of every Wi-Fi network you've ever connected to if you're using an iPhone you can't even access that list there's no way to actually find a list and delete things from it and I know Android there are different ways to do it on a computer.
18:30. On my Mac I've seen you can you can say forget this network.
18:35. On your Mac, you can; yeah, on your computer but not on your phone. You know how it's so seamlessly connects when you go to someone's house you where you've connected before it just automatically happens. Why does that happen? Because every few seconds your phone emits this probe request that says, "Hey every single Network that I've been connected to, are you available right now?" That's a unique identifier that says that you're the only person in the world that has all of those Wi-Fi addresses that setting up for probe requests at any given time. Because you're the only person who's been to my house and then to your best friend's house and your parents house and your work and so it's a unique identifier.
19:27. Now how is this exploited this is a huge security threat but what we know is that these things are publicly available what other people are collecting this information we know the Google and apple have treasure troves of information that they're collecting at all times you know those driverless cars that drive around the waymo cars they are also sending out probe requests to be picked up Wi-Fi Wi-Fi probes picking Wi-Fi networks they're accessing all those information and creating these databases so wiggle.net is a site that tries to cut a log of a lot of information but they don't have nearly as much information if you're terrified by the information you can search for on their site you should be doubly terrified of what Apple and Google have because what this means is that a database exists, a database exist that has all this information and if it exists it can be exploited. What kind of oversight is being given to these? What kind of security measures to protect them? What kind of leverage do governments who are trying to extradite people have to access this information? They probably have a huge amount of leverage.
20:35. So what's something that you can do? Turn off your Wi-Fi when you're not using it. Don't just keep it probing something you can keep in mind with iPhones is when you go in your settings if you have at the control center and you turn it off that doesn't turn it off that just says forget this until tomorrow you know like don't try to access until tomorrow so your Bluetooth and Wi-Fi are going to be on until you go into the settings and turn them off