Open metronidazole opened 11 months ago
The MAC randomization feature randomizes the address by setting the locally administered bit to 1, and the unicast bit to 0. The other 46 bits are randomized.
Ref: https://source.android.com/docs/core/connect/wifi-mac-randomization-behavior
But there is no easy solution to this, see Tails - MAC address anonymization. Any good proposals? How do we get suitable OUIs to use?
Randomized wifi mac addresses are easily discernible because the second digit of the MAC address will be a 2, 6, A, or E.
This is a problem when connecting to some enterprise wireless networks (including many eduroam networks) because they enable a feature that prevents clients with a randomized MAC address from connecting.
It would be nice if a feature could be added to improve the privacy of grapheneOS by allowing a randomized MAC address to not follow the standards and thus not be trivially blockable. The risk of conflicts is low and is outweighed by the privacy and usability benefits from such a feature.