They only expose approximate, not precise, locations, so they shouldn’t be a risk like GPS that exposes precise locations?

  • shalafi@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    ·
    2 days ago

    What?! You need the MAC to identify a router and MACs don’t go over the internet.

    it would have been possible to track your ip and what it was accessing online

    I’ll let you go ahead and explain that one.

    • teslasaur@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      1 day ago

      No, of course not the MAC. Just as an example nmap can guess the OS based on fingerprinted behaviours. There are pentesttools that can guess the OS.

      Like i said. Old days. You could get access to a distribution switch where the physical security was all that mattered. The town where i grew up had some early variation of cg-nat that meant all devices where in a way on the same network. It created plenty of issues when trying to play online with friends during Quake/WC3 etc.

    • credo@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      2 days ago

      Maybe if you open a browser to it and external management is allowed, it might say linksys?

      • lazynooblet@lazysoci.al
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 days ago

        Also nmap uses fingerprinting on port scans to identify devices. Or attempt to, a lot of the time it doesn’t know, or says “Linux”