halo / LinkLiar

:link: Link-Layer MAC spoofing GUI for macOS
http://halo.github.io/LinkLiar
MIT License
1.23k stars 84 forks source link

Spoof as early as possible during boot (when deamon starts up) #34

Closed JamieJ1 closed 2 years ago

JamieJ1 commented 4 years ago

Does this app start spoofing my MAC address as soon as I restart my laptop? Or do I have to start the app first? (sorry didnt know where else to post questions)

halo commented 4 years ago

Hi! This is the right place to ask the question :)

Have a look on this page. If you turn on the "Run in Background" option, a daemon with root privileges will be activated.

That daemon is designed to spoof your MAC address (according to your desired configuration)

Now, "network conditions changed", happens roughly when you come to your login screen after boot, so to answer your question, yes, it spoofs on boot.

But there is a slight chance that your real MAC address will be exposed for a second or so, before the spoofing takes effect. Just like plugging in a wifi-dongle will expose its MAC address for a short time.

However, after booting, your MAC address should remain spoofed at all times, given that the daemon is alive.

(To go sure, I should let the daemon always run once whenever it is activated, i.e. as early as possible on boot. I'll keep this issue open until that is solved. Just as a fallback security I guess. Can't hurt.)

AnonymousAnonymousAnonymous commented 4 years ago

Thank you very much for your work and maintenance on this app. I have it on my top 3 must-have Mac apps ever, since I left Windoze many moons ago.

halo commented 2 years ago

I checked the code and it already does what we want. So I'm closing this issue.

By the way, there is a pre-release that you might want to try out: https://github.com/halo/LinkLiar/releases/tag/3.0.0

Thank you for your patience.