[tor-bugs] #11096 [Tor bundles/installation]: Randomize MAC address before start of Tor
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Feb 28 19:57:41 UTC 2014
#11096: Randomize MAC address before start of Tor
------------------------------------------+-------------------
Reporter: csoghoian | Owner: erinn
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Tor bundles/installation | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
------------------------------------------+-------------------
Comment (by cypherpunks):
Protecting against malware after it is already running on your system is
very difficult and way out of tor's scope. Also, most network cards don't
support permanently changing your MAC (you can see this when you run
macchanger, it shows your permanent MAC) so the malware could just read
the permanent MAC anyway.
However, changing your MAC *is* good for preventing LAN adversaries from
linking your presence/activity in different locations, and Tails can do
this (and hopefully will do it by default soon):
https://tails.boum.org/doc/advanced_topics/mac_changer/index.en.html
Non-Tails users who are worried about network adversaries linking their
presence in multiple locations should be aware of #10969 (set of guard
nodes can act as a linkability fingerprint) which is much more significant
than the MAC address since the guard connections are visible to the user's
ISP as opposed to just their LAN. (Tails doesn't use persistent guards
(yet), so this isn't a problem there.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11096#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list