Post by Jeff LiebermannI've been retired from active involvement in such things since I
closed my former palatial office in late 2020.
Good for you that you finally retired from all that work, especially now
that Mike at Ridge, Loren at Hilltop, Etheric, Surfnet, etc., are competing
with the likes of Frontier (although Andrea Lovelady at Surfnet says they
received a series of 10 million dollar grants to put fiber in the Santa
Cruz mountains). To bad Brett, in Arizona, has passed away. RIP Brett.
He was acerbic, to say the least, but he got the job done when needed.
Post by Jeff LiebermannSorry, but I know nothing about spoofing a wi-fi
generated location on an Android phone.
Don't worry. I don't know how to do it either, but I'm confident it is
simply done with software passing fake data via the Google APIs.
This set of screenshots of mine show they do "something" like that.
<
Loading Image...> Android mock location
<
Loading Image...> Best mock location apps
<
Loading Image...> Mock location setting
<https://i.postimg.cc/7L8BN7Nq/mocklocation04.jpg> Spoof wifi/gps provider
<
Loading Image...> Randomize road speed
<
Loading Image...> Spoof Wi-Fi provider
I just have to figure out HOW to tell what the heck they're spoofing.
Maybe WireShark, Netstumbler, WiGle, etc., might tell me. Dunno.
You're the Wi-Fi expert who taught me everything I know, way back in the
day when I was trying to spoof my MAC address (now the AP MAC addresses are
spoofed by default on iOS and Android).
You told me, long ago, that you can't spoof the ROUTER's WAN-facing MAC
address though - which - unfortunately - is the one we'd want to spoof!
Post by Jeff LiebermannI doubt that location
information is sent back to some spy agency via wi-fi where it might
be intercepted at a router or access point. If they are using wi-fi,
one should be able to see NMEA 0183 data using Wireshark, which I only
see with GPS trackers.
The problem is that 9,998 out of 10,000 people have their phones set up to
hand Google (and others like Mozilla) the unique BSSID & unique GPS
location of your home router's access points.
My phone doesn't do that, of course, but I'm the 1 out of 9,998 people who
has his phone set up responsibly. The rest are irresponsible rude people.
Given 9,999 out of 9,998 people are rude & irresponsible, what I have to do
to keep my unique router access point SSID out of Google's (and others')
databases is more than just append "_nomap" to opt out of the database.
If you just append "_nomap" to the outward-facing access-point SSID, all
that accomplishes is Google "says" they will scrub you out of their db.
But all the phones that drive by my house will still UPLOAD that unique
BSSID & GPS information (and signal strength, and a few other things) to
the Google (and other) databases - so you have to trust that Google will
scrub it.
While Google probably does scrub the unique BSSID & GPS location of your
home router access points that have "_nomap" appended, you can't trust that
all the similar databases will do so, e.g., Apple got in trouble recently
for handing out four hundred at a time of these datapoints to hackers.
<https://www.theregister.com/2024/05/23/apple_wifi_positioning_system/>
So what do you do on Android to keep the 9,999 rude people out of 10,000
people from UPLOADING your unique BSSID & GPS location to those databases?
You "hide" the broadcast! It' that simple (almost). Yes, we're all well
aware that hiding accomplishes nothing in terms of security but it actually
accomplishes "something" in terms of privacy.
Remember those 9,998 rude people?
All of those 9,998 phones won't even "see" a hidden broadcast SSID!
So they no longer UPLOAD your unique BSSID & GPS location to the databases.
But what about the other person in the 2 out of 10,000 people?
That person is using something like WiGle or WireShark, and that person
will, of course, see the hidden SSID but that person isn't the major
concern.
The major concern are the 9,998 rude people who upload your unique BSSID
and GPS location to the Google (and other) databases which, if you look at
the URL I provided above, are abused like you can't believe by hackers.
Now, there "is" a problem with hiding the SSID broadcast of your home
router, which is that if you have auto-reconnect set on your phone, then
your phone will be "L@@KING" for that specific SSID - which - for the
tinfoil hat folks (I've been accused of being one of them) is a no no .
So you have to turn OFF the auto-reconnect to the home SSID (you could
geofence automate it, but that's a whole 'nuther can of privacy worms).
So now you're as private as you're gonna get, in terms of Wi-Fi...
1. You set your home router to NOT broadcast your router's AP SSID
2. You set the phone to NOT automatically reconnect to that AP SSID
3. You add a homescreen shortcut to make the manual connection a single tap
The result is:
a. Your home is the only home in town that is NOT in the Google database
(Apple too, Mozilla too, who knows how many others there are)
b. Your phone does not shout out your AP BSSID when you're away from home
This is good.
Except....
All your stupid neighbors are in the 9,998 out of 10,000 rude people only
this time it's 9,998 out of 10,000 routers are throwing your privacy under
the bus instead of the 9,998 out of 10,000 phones we spoke about above.
You can't get all your neighbors to put "_nomap" on their SSID.
They're too stupid. Yes. I've tried. They don't get it.
It's where I've learned that most people are incredibly stupid.
Somethuign this simple is beyond their comprehension.
Google takes advantage of that.
So does Mozilla.
And Apple.
(Even Microsoft does with its "_optout_" shenanigans.)
Post by Jeff LiebermannIf you really want to track your location, without butchering your
phone or having an evil spy agency looking over your shoulder, maybe
disabling your GPS (with some aluminum foil shielding), plugging in an
external USB hockey puck GPS receiver, and running your own server
<https://www.traccar.org>
You will not be able to benefit from cell tower location accuracy
enhancements, but with improved WAAS and additional satellite
constellations, you should be ok. The hard part will be to find an
Android mapping app that accepts external (USB) NMEA 0183 data.
I do NOT want to "track my location". I can already do that.
We've *always* been able to do that.
What I don't want is Google/Mozilla/Apple/etc. tracking my location.
The way to do that is what I'm seeking.
I can already do it for GPS.
But I don't know how to do it for Wi-Fi.
Post by Jeff LiebermannGood luck with whatever you're trying to accomplish.
All I'm trying to do is spoof the Wi-Fi location the same way that I'm
already spoofing the GPS location when I'm using an app that doesn't need
either but which has Google GSF incorporated into it so it asks anyway.
A cellular debugger doesn't need precise Wi-Fi or GPS location information.
A weather app doesn't need precise Wi-Fi or GPS location information.
A browser app doesn't need precise Wi-Fi or GPS location information.
An insect lookup app doesn't need precise Wi-Fi or GPS loc information.
A security camera setup app doesn't need precise Wi-Fi or GPS loc data.
A wifi signal strength app doesn't need precise Wi-Fi or GPS location.
None of these apps need precise Wi-Fi or GPS location information; but
Google forces them all who use GSF to get it for Google.
That's the problem I'm trying to solve.
When an app does NOT need precise Wi-Fi or GPS location information, why
should I give it to them. I don't need it. The app doesn't need it.
It's Google who wants it.
I've already solved the problem for "my" Wi-Fi access point.
But I have the problem of the 9,998 rude people's Wi-Fi access points.
Those are my neighbors who are the dumbshits throwing me under the bus.
I need to spoof THEIR wi-fi access point BSSID & GPS locations on my phone.
So that's the issue I'm trying to solve on the Android phone.
a. How to spoof GPS location information (done).
b. How to spoof Wi-Fi location information (that's the question!)