/wipri

(Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing w/Brand Mimics: run as command or optional new randomized identity each boot; includes flags for continually changing random times/changing valid OUI addresses + Hostname randomizer + Device/Signal/location anonymization

Primary LanguageShellGNU General Public License v3.0GPL-3.0

wipri (WiFi Privacy) - Privacy Disinfo Tool (as command and / or automated every boot!)

WIFi Device/MAC/Device Metadata Disinfo: Address Changer/Hostname randomizer/Device/Signal/location Privacy

[Without disconnecting from internet]


wipri project is still active and latest has moved to dedicated private git server for the current moment (see below)

Above Gitea Onion location is the best place to file issues (Gitea Onion is checked daily, not on github as often)

[ Gitea Onion is dedicated anonymous Git server respecting user anonymity ]

(Use Tor Browser, or torify / Tails / Whonix) is the main location and is updated more often.


REQUIREMENTS (AS OF THIS VERSION)

LINUX DEVICE (with the following):

  • wireless-tools (for the signal related flags)

  • systemd (only needed if you wish to automate custom flags starting at boot using install.sh)

  • nmcli (NetworkManager Cli is needed for -w flag)


NOTE: You don't need to understand everything in README to get started. It's simple.

Just run the install.sh and answer the simple questions to let wipri take care of the install + startup for you.


  • NEW * wipri-list (option) allows you to create random yet valid OUI lists (or single quasi-perm mac file!), flags to select at random a mac from list, set it, remove, generate new ones to list, etc.

  • NEW * wipri-eth0.service, wipri-eth0-usb.service are additional example service files helping you manage multiple devices. Instructions provided within .service files

  • NEW * -w flag (optional) to automatically turn off wifi radio when you get far away from your saved networks: to prevent saved SSID / identifier leaks

(use the -w flag anytime (requires nmcli), either by itself (always use -d flag to set device), or combined with other flags [like -p, -m, -r, -i, etc])


wipri-list Command:

TIP: Want a single 'quasi-permanent' mac address option for ethernet access control list (or wifi)?

Easy:

Set up wipri service automatically by running install.sh and choosing: wipri-list -s eth0 (replace eth0 with your device, be it wifi or ethernet) command as your answer on initial install.sh 'boot' question.

Running install.sh automatically creates the first wipri-list valid mac address, adding it to wipri-list's list (during install).

Since it automatically creates that first mac in your wipri-list 'list', you could leave it to create a single quasi-perm mac address service.

This can help for those who want to 'spoof' their mac, but wish to have a valid yet random 'permanent' mac address. Ideal for mac access lists (in network), or simply to recognize your mac at all times.

After this you can add additional mac addresses to your list anytime, by running wipri-list -a (to add new generated, valid OUI mac)

And like I said, it's easy to automate this "set random mac from your wipri-list list" by answering install.sh running with wipri-list -s eth0 command.

Other Uses For wipri-list: wipri-list will set a static single mac, if only one is on its list. If you add additional using -a, wipri-list will choose one inside the list at random each run, or boot (if you install it to use wipri-list at boot).*

Personal: It's up to you how you want to use it. I personally like setting permanent protective wipri service commands for wifi, and enjoy wipri-list inside my wipri-eth0.service file to maintain a quasi-perm ethernet mac (you can make it change every boot if you like, or keep recognized spoofed macs, generated automatically for you)

I include an example wipri-eth0.service file for your convenience.

BONUS Example wipri-eth0.service Ethernet File (create 2nd wipri service for ethernet)

The example wipri-eth0.service file can be edited to use commands to your liking.

Once you are happy with the wipri related command flags and device name (eth0 in example for ethernet), you can then run following commands to activate the wipri-eth0.service file (to maintain quasi-perm mac address, or changing list at each boot for ethernet example)

Activating Example wipri-eth0.service / wipri-eth0-usb.service File (after running install.sh installs wipri):

sudo cp wipri-eth0.service /etc/systemd/system

sudo systemctl daemon-reload

sudo systemctl enable wipri-eth0.service   (this command will set it to start next boot)

sudo systemctl start wipri-eth0.service    (start newly added wipri ethernet service)

Something Not Clear?

Questions about wipri, wipri-list, leave a comment, Or, Send An Email: righttoprivacy[at]tutanota


Have A Unique / Great Ideas You Want To See? file an issue here, or contact me!


UPDATING WIPRI: IS SIMPLE!

Download latest wipri here or at Gitea Onion (address below)

re-run the install.sh, to overwrite your old wipri with new features!

  • For Our Ethical Human Rights *

Learn More On Usage With Screenshots/video: https://politictech.wordpress.com/2021/12/18/wifi-privacy-with-wipri-any-linux-device/

Learn About Wireless privacy, WiPri + Why It Exists On This Video + diagram posts: https://www.buymeacoffee.com/politictech/wireless-privacy-tips-what-about-hearing-aids

Latest WiPri Updates appear on Wipri's Tor Hidden Gitea Service (contrib your own Wiki's, books): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/WiPri/ (view in Tor Browser)

USE:

wipri -d [device] -w [automatically turn wifi radio off anytime you leave home] -r [randomizes mac continually changing times/addresses] -a [continually randomize MAC, hostname, signal variations] -m [Static MAC] -i [new MAC identity] -h [rand hostname] -H [restore prev hostname] -s [random signals] -A [randomized WiFi Network SSID Change: optional netcat notification of new names- add ip address to $ncnotify]


Features:

-d sets your device (use this flag always).

-w turn wifi radio off when outside your home automatically to prevent saved SSID's and other identifer leaks

-r continually randomizes your mac address at randomly generated, continually changing random MAC addresses/times.

-p Android/iPhone mimic mode: sets single static identity: randomly generated valid mac address of either Apple or Android.

-P Android/iPhone mimic mode: continually changing randomized Samsung/Apple mac address changes- continually changing, at randomized changing times, using continually changing, randomized yet valid OUI Apple/Samsung mac addresses (this setting allows you to appear to WiFi trackers/sniffers [like KISMET] at any given time, as either an Android or iPhone;

-m [mac here] sets a mac address of your choice, holds it for remainder of running (checks to ensure firmware does not reset it)

-h change hostname to generic yet unique and completely random hostname. Using a generic base with random extension at the end of it.

-R restore hostname (first wipri run saves your hostname, this flag restores that hostname for you)

-H prints help; print out wipri command examples

-i generates a valid OUI based mac identity

-s txpower randomizer (experimental) randomizes the txpower of your device. This confuses certain WiFI trackers that determine location by signal strength.

-a anonymous mode: launch coordinated random changes: each change happens simultaneously: when the mac address changes so does the hostname and txpower/signal. This is intended to simulate new devices and changing locations. All 3 changes happen simultaneously, at changing, randomized times.

-A WiFi Access Point Randomize: generates a generic yet completely random SSID Network Name and restarts hostapd with this new SSID. Tip: Pair with wipri's static mac settings (i, p, m) to create a new network.
[for -A above, a netcat notification is optional; be sure to check variables and change $ncnotify variable value to 'on' or 'off': may add flag for this in an update]

Quick Start: Automate Installation + Boot / Command Option By Running install.sh

sudo bash install.sh

Next, install.sh asks if you would like wipri to run automatically at boot (early to prevent any leaks). And you can choose whatever wipri or wipri-list command you would like to run at boot.)

(install.sh installs files exactly where they need to be)

That's it. wipri is now installed as a command.

install.sh offers the additional option of starting a wipri or wipri-list flag / command at boot (if you answer 'yes' to the question of installing as a systemd service).

Do not forget to include -d [devicename] when issuing commands.


Tip: if you decide to try the newer -A wifi access point randomize, pair with your choice of static mac flags to create new WiFi network (prevents static databasing such as Wigle) For the above random ssid option I added optional netcat notification and will expand on this later. Post a question if you have one.


DISABLING WIPRI AT BOOT (IF YOU INSTALLED AND WISH TO STOP IT/DISABLE IT)

Disabling WiPri Boot (Once installed) Is Very Easy:

sudo systemctl stop wipri    (this stops current wipri process in systemd)
sudo systemctl disable wipri (this DISABLES WIPRI from next boot - use 'enable' to re-enable)

Additional Info:

wipri generated mac addresses use valid OUI's (unlike some mac randomizations). See below for why.

If using a Linux phone / device, I suggest selecting -p for home, -P for out. To mimic an iPhone/Android phone: one of the most common devices around. -p for static (w/mac checking to prevent leaks), -P for continually changing Apple/Android mac at continuously changing times/mac addresses. For even more broad randomization use -r for continuously changing randomization at continuously changing randomized times (all brands) or -i for static random mac identity


Why does wipri use valid OUI's?

One documented method of tracking down a devices' 'real mac address' includes cancelling/striking out all mac addresses with an invalid/nonexistent OUI preface (common problem with other built in mac randomization options).

From here one can narrow down from false OUI's. Wipri avoids this issue by using OUI lists (all brands). wipri is argument/flag based, to more easily allow you to incorporate wipri commands into scripts. Run wipri command anytime you need privacy or (optionally) or use the install.sh script to install wipri w/optional new identity changes for each boot. Wipri disables ipv6 by default (ipv6 addresses at times are based on mac address) If you do not wish to disable ipv6, change value of $turnipv6 variable to 'on'.

Another concern I've had with some other mac address randomization options is the commonly used "keep the real OUI".

I understand the WHY behind this. Personally decided against for my own devices. Example: what if in the history of a device, your new install were to leak the permanent mac somewhere?

If the permanent OUI were used, and logged, how might this become a risk of linking itself to the 'spoofed' to the permanent (same REAL hardware OUI - narrows it down quite a bit)

Some of the thought process behind wipri https://youtu.be/291uohokEOQ?t=166


TUTORIALS + SUPPORT:

☕ READ TUTORIALS / BUY ME A COFFEE: https://buymeacoffee.com/politictech

❤️ MONERO: 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

❤️ CashApp: https://cash.app/$HumanRightsTech

📝 TUTORIAL POSTS: https://buymeacoffee.com/politictech/posts


PUBLIC SERVERS / SERVICES TO PROTECT YOU

GITEA ONION (ANONYMOUS GIT SERVICE: ADD YOUR PROJECTS OR CONTRIBUTE!): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/explore/repos

📝 Blog Mirror: https://politictech.wordpress.com (see https://buymeacoffee.com/politictech/posts for organized category posts + searchable titles)

🔐 💾 ANON PASTEBIN (PRIVATEBIN 🧅 TOR SERVICE): http://ikgybpx6kltqcnox3tv3zhw7zw3ig7f3jfjo6ypojpmoys7q4hcf2gid.onion/paste/ ('burn after reading', self destruct options, AES 256bit encrypted "zero knowledge-snark" (not even host can read pastes), password protection. For Community Use (ethical usage only)

🤝 🎁 EXTRAS / SUPPORT: https://buymeacoffee.com/politictech/extras


VIDEO CHANNELS (including guide to wipri, linux, sdr, more):

PEERTUBE: https://tube.tchncs.de/video-channels/privacy__tech_tips/videos

ODYSEE VIDEO/FILE CHANNEL: https://odysee.com/$/invite/@RTP:9 (joining Odysee with my invite link helps me promote content + you earn cryptocurrency (LBRY) for watching videos)

YOUTUBE: https://www.youtube.com/channel/UChVCEXzi39_YEpUQhqmEFrQ​

BRIGHTEON: https://www.brighteon.com/channels/righttoprivacy

BITCHUTE: https://www.bitchute.com/channel/yourprivacytv

BRANDNEWTUBE: https://brandnewtube.com/@RightToPrivacy​ (NEW)


CONTACT / INQURE

<righttoprivacy[at]tutanota.com>