BramBonne / privacypolice

Source code for Wi-Fi Privacy Police, available on Google Play at https://play.google.com/store/apps/details?id=be.uhasselt.privacypolice
GNU General Public License v2.0
159 stars 17 forks source link

Do recent versions of Android still leak SSID's? #58

Open raboof opened 5 years ago

raboof commented 5 years ago

The README lists as one of the reasons to use this app:

It prevents your smartphone from sending out the names of Wi-Fi networks it wants to connect to over the air. This makes sure that other people in your surroundings can not see the networks you've connected to, and the places you've visited

However, AFAICS this no longer appears to be the case even without this app installed: I haven't been able to reproduce this issue with my Android 9 device. Do we know until what Android version this was a problem?

vertigo220 commented 1 year ago

This article shows that newer versions have improved a lot, but I'm still not clear on just how much, since it seems to indicate even the newer ones still leak some info, and I'm not sure what a lot of the stuff in the table means and therefore which version would be the minimum for accomplishing what Privacy Police did, though it looks like 8+.

I don't understand why it's even necessary for phones to send out probes. They should just listen and, when they see a network they know, which they should verify by SSID name as well as some other info, only then should they transmit anything in order to initiate a connection. The whole way Wi-Fi works in this regard just seems ridiculous.

I'm also not sure how an evil twin attack could happen, since just setting up the same SSID shouldn't be enough. If somebody sets up an AP with the same SSID as my home one, when the phone attempts to connect, part of that being a security handshake with e.g. WPA2, it should realize the malicious AP isn't the correct one since it the security doesn't match, i.e. the password doesn't work.

It would be nice if someone with more networking knowledge could chime in. I know this app is discontinued, but I'd assume @BramBonne, having developed it, has knowledge about this stuff and could hopefully offer some insight.

raboof commented 1 year ago

when the phone attempts to connect, part of that being a security handshake with e.g. WPA2, it should realize the malicious AP isn't the correct one since it the security doesn't match, i.e. the password doesn't work.

That seems like an optimistic assumption: I'm not confident the handshake authenticates the AP to the client (just vice-versa), and it's entirely conceivable to me that you could set up an AP that just accepts any password.

vertigo220 commented 1 year ago

when the phone attempts to connect, part of that being a security handshake with e.g. WPA2, it should realize the malicious AP isn't the correct one since it the security doesn't match, i.e. the password doesn't work.

That seems like an optimistic assumption: I'm not confident the handshake authenticates the AP to the client (just vice-versa), and it's entirely conceivable to me that you could set up an AP that just accepts any password.

Ah, good point. If true, though, then that seems like a gross oversight in the design of the handshake procedure.