Technology Insights

Scramble the BSSID in a Wireless Capture to Keep Your Self Anonymous

I have had lots of people email me and ask if there is anyway to make it impossible for a attacker to recover your mac address from a capture file. If you are using one of our tools like the WPA Cracker in our tools section, you may be hesitant to upload a clients capture data because a skilled attacker could use the capture and the online Wiggle database to pinpoint your location assuming your area has been mapped by wardrivers. Although we run a secure site there is no way for you as the client to know this.

Technology Insights

Tor Tunnel

You may have heard of the Tor network which if affectionately known as the onion router. Tor is a anonymity software which is free and open source. The trouble with Tor is that it can be dreadfully slow for every day use. Moxie Marlinspike has come up with a solution called Tor tunnel. Tor tunnel basically uses just the Tor exit node rather than all the hops in between. Of course this is not as good a solution for anonymity however in situations where you only need to be mildly anonymous it can be effective.