• Re: How to test if your access point BSSID is in the highly insecure Ap

    From Jolly Roger@3:633/10 to All on Friday, December 05, 2025 19:59:27
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-05, Alan <nuh-uh@nope.com> wrote:
    On 2025-12-05 04:08, Marian wrote:
    How to test if your access point BSSID is in the highly insecure Apple WPS >> database and, if it is in Apples insecure WPS database, what else is there. >>
    If you'd like me to test if your access point BSSID is in the Apple WPS
    database, then simply respond with that BSSID & I'll run the Windows
    scripts I just wrote based on research published recently of the flaws in
    Apple's methods (some of that research is listed in the signature below).

    Note that your BSSID should not be in Apple's database if you've opted out >> by appending "_nomap" to your access point SSID (e.g., "my.ssid_nomap").

    None of my access point BSSIDs are in the Apple database, but I have the
    optout keywords _optout_nomap appended to all of them, but once I confirm
    the process works, I'll be glad to write a tutorial so others can do it
    too.

    Let me know which BSSIDs you wish me to look up for you in Apple's WPS.

    Or, if you want to do it without involving Arlen:

    <https://wavedigger.networksurvey.app/?tab=bssid>

    I checked mine...

    (And I've been using the same router for more than 5 years)

    ...and surprise, surprise: it's not in there!

    Yup. Same here. Another nothing burger from little Arlen.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Friday, December 05, 2025 21:17:52
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-05 20:11, Alan wrote:
    On 2025-12-05 04:08, Marian wrote:
    How to test if your access point BSSID is in the highly insecure Apple
    WPS
    database and, if it is in Apples insecure WPS database, what else is
    there.

    If you'd like me to test if your access point BSSID is in the Apple WPS
    database, then simply respond with that BSSID & I'll run the Windows
    scripts I just wrote based on research published recently of the flaws in
    Apple's methods (some of that research is listed in the signature below).

    Note that your BSSID should not be in Apple's database if you've opted
    out
    by appending "_nomap" to your access point SSID (e.g., "my.ssid_nomap").

    None of my access point BSSIDs are in the Apple database, but I have the
    optout keywords _optout_nomap appended to all of them, but once I confirm
    the process works, I'll be glad to write a tutorial so others can do it
    too.

    Let me know which BSSIDs you wish me to look up for you in Apple's WPS.

    Or, if you want to do it without involving Arlen:

    <https://wavedigger.networksurvey.app/?tab=bssid>

    I checked mine...

    (And I've been using the same router for more than 5 years)

    ...and surprise, surprise: it's not in there!

    Mine is.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Jolly Roger@3:633/10 to All on Friday, December 05, 2025 22:17:18
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-05, Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-05 20:11, Alan wrote:
    On 2025-12-05 04:08, Marian wrote:
    How to test if your access point BSSID is in the highly insecure Apple
    WPS
    database and, if it is in Apples insecure WPS database, what else is
    there.

    If you'd like me to test if your access point BSSID is in the Apple WPS
    database, then simply respond with that BSSID & I'll run the Windows
    scripts I just wrote based on research published recently of the flaws in >>> Apple's methods (some of that research is listed in the signature below). >>>
    Note that your BSSID should not be in Apple's database if you've opted
    out
    by appending "_nomap" to your access point SSID (e.g., "my.ssid_nomap"). >>>
    None of my access point BSSIDs are in the Apple database, but I have the >>> optout keywords _optout_nomap appended to all of them, but once I confirm >>> the process works, I'll be glad to write a tutorial so others can do it
    too.

    Let me know which BSSIDs you wish me to look up for you in Apple's WPS.

    Or, if you want to do it without involving Arlen:

    <https://wavedigger.networksurvey.app/?tab=bssid>

    I checked mine...

    (And I've been using the same router for more than 5 years)

    ...and surprise, surprise: it's not in there!

    Mine is.

    So one out of several. Not a great batting average.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From J. P. Gilliver@3:633/10 to All on Saturday, December 06, 2025 00:08:16
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025/12/5 19:59:27, Jolly Roger wrote:
    On 2025-12-05, Alan <nuh-uh@nope.com> wrote:
    On 2025-12-05 04:08, Marian wrote:

    []

    Let me know which BSSIDs you wish me to look up for you in Apple's WP
    S.

    Or, if you want to do it without involving Arlen:

    <https://wavedigger.networksurvey.app/?tab=bssid>

    I checked mine...

    (And I've been using the same router for more than 5 years)

    ...and surprise, surprise: it's not in there!

    Yup. Same here. Another nothing burger from little Arlen.

    I checked mine by name, and got

    (!)
    Invalid BSSID format. Expected 12 hexadecimal digits (e.g.,
    AA:BB:CC:DD:EE:FF)

    (Probably what the B means?)

    --
    J. P. Gilliver. UMRA: 1960/<1985 MB++G()ALIS-Ch++(p)Ar++T+H+Sh0!:`)DNAf

    "Bother," said Pooh, as he fell off the bridge with his stick.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Saturday, December 06, 2025 02:02:21
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 01:16, Marian wrote:
    It's classic for the Apple trolls to claim everything they can't understand is a "weak lie" as Jolly Roger just did, but the fact remains that my BSSID is in Apple's database (and the SSID is hidden & has "_nomap" appended).

    So all your efforts to hide yourself are for nothing. You are listed.
    You might as well not bother to hide! :-D

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Alan@3:633/10 to All on Friday, December 05, 2025 17:25:05
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-05 17:02, Carlos E.R. wrote:
    On 2025-12-06 01:16, Marian wrote:
    It's classic for the Apple trolls to claim everything they can't
    understand
    is a "weak lie" as Jolly Roger just did, but the fact remains that my
    BSSID
    is in Apple's database (and the SSID is hidden & has "_nomap" appended).

    So all your efforts to hide yourself are for nothing. You are listed.
    You might as well not bother to hide! :-D


    The BSSIDs are listed.

    There is no easy link between a BSSID and the person or organization
    that is using it.

    A click using WaveDigger's site to search by location near my building
    (as a for instance) returns more than 1,500 BSSIDs...

    ...and NONE of them actually show as being in my actual building.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Saturday, December 06, 2025 13:01:49
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 01:55, Marian wrote:
    Linux:
    1. Open a terminal
    2. Type: sudo iwlist scan
    3. Find your SSID in the output
    4. Look for "Address:" lines
    5. Copy the MAC address (format: AA:BB:CC:DD:EE:FF)

    ~# iw dev wlan1 link
    Connected to AA:BB:CC:DD:EE:FF (on wlan1) <===
    SSID: ....
    freq: 5580
    RX: 3443127087 bytes (2936179 packets)
    TX: 47463826 bytes (444078 packets)
    signal: -33 dBm
    tx bitrate: 433.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 1

    bss flags: short-preamble short-slot-time
    dtim period: 3
    beacon int: 100
    ~#

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Saturday, December 06, 2025 13:02:35
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 02:53, Marian wrote:
    It may be that by hiding my SSID broadcast, I prevented Apple from recognizing
    that the _nomap was appended to the SSID, for example.

    Maybe.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Saturday, December 06, 2025 13:32:16
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-06 01:16, Marian wrote:
    It's classic for the Apple trolls to claim everything they can't understand is a "weak lie" as Jolly Roger just did, but the fact remains that my BSSID is in Apple's database (and the SSID is hidden & has "_nomap" appended).

    So all your efforts to hide yourself are for nothing. You are listed.
    You might as well not bother to hide! :-D

    Mine isn't listed and I did nothing to hide.

    As has been said before, trying to hide makes one suspect, because
    *other* factors stand out.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Saturday, December 06, 2025 13:36:23
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian <marianjones@helpfulpeople.com> wrote:
    J. P. Gilliver wrote:
    Can you get any idea of what's in the database, or can you only check it
    for a specific given one? (I. e. does it accept wildcards or anything
    similar?)

    I ask as it'd be interesting to know if it _does_ contain any _nomap
    ones, but you can't find that out if you have to specify them exactly.
    (Though you could make up a few to try, but that wouldn't be conclusive
    unless you succeed.)

    Hi John,

    Thanks for asking as we can all work together on this privacy project.

    It's worse than I thought. I checked the Apple database for my own BSSID of an access point that has had "_nomap" on it for years, and it was in the Apple database!. The real GPS location. It was horrid. I almost fainted.

    lol. Just goes to show all your paranoia is wasted. We can now all know
    exactly where you are and what you're doing at all times[1]. Mwahaha!!

    All we need to do that is a BSSID of an AP that isn't in your own home (because I understand nobody wanting their own home to be geolocated).

    There are maps which "geolocate" everyone's home.

    But that's the whole point.

    If it's that easy for anyone to look up where we live based only on our BSSID, then there's something horrid going on, don't you think?

    The only horrid[2] thing is how inept you are. You spend all your time
    trying to protect your privacy and fail at the simplest level.

    [1] we literally can't, because a MAC only links a property. There's no
    other info inherent in that.
    [2] horrid == tragically funny

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Saturday, December 06, 2025 14:50:45
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 14:32, Frank Slootweg wrote:
    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-06 01:16, Marian wrote:
    It's classic for the Apple trolls to claim everything they can't understand >>> is a "weak lie" as Jolly Roger just did, but the fact remains that my BSSID >>> is in Apple's database (and the SSID is hidden & has "_nomap" appended).

    So all your efforts to hide yourself are for nothing. You are listed.
    You might as well not bother to hide! :-D

    Mine isn't listed and I did nothing to hide.

    As has been said before, trying to hide makes one suspect, because
    *other* factors stand out.

    I am curious, though, about why some people are listed and some are not. What's the criteria? Maybe just chance. A passerby having the proper non intentional software working properly, I'd guess.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Saturday, December 06, 2025 14:43:47
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian <marianjones@helpfulpeople.com> wrote:
    Carlos E.R. wrote:
    It's classic for the Apple trolls to claim everything they can't understand >>> is a "weak lie" as Jolly Roger just did, but the fact remains that my BSSID >>> is in Apple's database (and the SSID is hidden & has "_nomap" appended).

    So all your efforts to hide yourself are for nothing. You are listed.
    You might as well not bother to hide! :-D

    Hi Chris,

    You're replying to Carlos.

    Alas... it's shockingly disturbing, so I'm very happy that I had checked!

    While the statement is horrifyingly correct that Apple has my BSSID in their WPS database even though I have appended "_nomap" to the SSID (and it's hidden)...
    and even though Apple says they respect the opt-out directive...

    I don't own the mentality of Sklaven.

    I am already documenting everything so that, if I need to, I can present the i
    nformation to someone in the legal profession who can stop this.

    "A fool and his money are soon parted."

    But at this point, I have to take Apple at its word.
    So I'm going to need to delve deeper to dig for "some kind of mistake".

    It may be that by hiding my SSID broadcast, I prevented Apple from recognizing
    that the _nomap was appended to the SSID, for example.

    Wouldn't that be ironic!

    "Hoisted by your own petard." Tragic.

    An alternative is that the "_nomap" flag only works going forward and
    doesn't require Apple/Google/etc to remove existing db entries already captured.

    Since I'm a well-educated scientist and engineer

    You are neither.

    <snip>

    Just hack the MAC or get a new router.

    If you were in the EU/UK you could demand them to delete the information
    under GDPR. But apparently you prefer your version of "freedom" and this
    isn't the american way.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Saturday, December 06, 2025 18:02:05
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian <marianjones@helpfulpeople.com> wrote:
    Chris wrote:
    You're replying to Carlos.

    Thanks for pointing out that I often confuse Carlos with you for some odd reason, which I apologize for. As I've explained many times, I wrote my own newsreader long ago so that I could pop up the edits in vi (later gVim).

    So I don't see anything in the header unless I take pains to look.
    However, the "attribute" line shows up, so I can see some identifiers.

    Not true. Your replies always have the person's name. See above where is
    says "> Chris wrote". That's in the *body* of your reply so you can see it.


    "A fool and his money are soon parted."

    I agree, and, you'll note, that in the last three decades of using
    computers, the only apps/programs I've ever need to pay for are:
    a. The company paid for MS Office (which I'm still using)
    b. The company paid for Adobe Acrobat writer (which I'm still using)
    c. Every year I buy at Costco on sale in December their TurbuTax

    Why use proprietary tools when appropriate free and open source
    alternatives exist?

    That's it. Even all my phones have been free lately.
    All I had to do was pay the sales tax on them.

    "Free" as in you have to pay $$$ every month to get them. Your iphone was
    also not free, remember. Cheap, but not free. We've been through this.

    Why are you such an incorrigible liar?

    I even get many tens of thousands of dollars of Amazon items for free.
    <https://amazon.com/vine/about>

    Many people calculate that the Amazon Vine members are two in a million.

    Amazon gives me tens of thousands of dollars of "stuff" for free
    (although the deal is that they require me to write reviews for them).

    No they don't. You've already admitted that it is the vendors which give
    you the items. Amazon is exploiting you. And yet you claim not to be a
    slave...

    Remember, if the service is free then you're the product.

    Of course, I have to pay income taxes on the MSRP of everything I get from Amazon so while there are no price limits per se, that limits what I get.

    It gets worse. jfc.

    In summary, I get much of what other people pay for, for free.
    As you stated, if you're intelligent, everything turns out to be free.

    Junk is still junk. The price doesn't matter.

    Never make the mistake to think that I'm anything like you are.

    Wouldn't that be ironic!

    "Hoisted by your own petard." Tragic.

    Well, never make the mistake of ever thinking I'm anything like you.
    I care deeply that other people get the benefit of all that I learn.

    But you never learn. You only look for things that support your dogma.

    In this case, I'm determined to find out the answer and then make sure
    people on the Internet LEARN the answer that I work hard to find out.

    You won't find the answer. You'll just keep making baseless assertions as that's all you can do.


    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Saturday, December 06, 2025 20:51:53
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian <marianjones@helpfulpeople.com> wrote:

    Donald changing his nym non-randomly to avoid killfiles noted. This was
    never about privacy.


    You spend all your time
    trying to protect your privacy and fail at the simplest level.

    Apple advertised that they would respect the _nomap suffix as an extremely clear and very obvious indication that we wished to not be in their db.

    That Apple put my BSSID in their database is an indication of their lack of moral rectitude.

    Firstly, the _nomap is on your user-defined SSID. Secondly, what is
    collected is the BSSID/MAC which in most cases cannot be edited.

    You can choose to hide your SSID. So if you've hidden your SSID the nomap option is superfluous as it won't show up anyway.

    There isn't, as far as I can see, an obligation to *remove* a MAC from the
    WPS db if they *never see* the nomap request.


    [1] we literally can't, because a MAC only links a property. There's no
    other info inherent in that.

    To claim we have no right to privacy is wrong;

    There you go changing the narrative to suit your ends. No-one has made that claim.

    the real issue is that our
    rights are being undermined by systems designed without meaningful consent.

    A MAC like an IP or a physical address is public information. There's no requirement for consent.


    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Saturday, December 06, 2025 20:51:56
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Andy Burns <usenet@andyburns.uk> wrote:
    Marian wrote:

    I wasn't going to check Google's database, but I just started writing the
    scripts to check Google's database to see if it was only in Apple's
    database. Anyone on the planet can query Apple's database.

    But to query Google's database, I need to generate a Google Geolocation API >> account

    You might remember I gave you a little curl-based script for that many
    years ago, it needs two WiFi MACs and works better if you tell it their relative strengths ... yes it needs an APIKEY

    He barely remembers his name from week to week.


    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From J. P. Gilliver@3:633/10 to All on Saturday, December 06, 2025 22:38:22
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025/12/6 20:51:53, Chris wrote:

    []

    There isn't, as far as I can see, an obligation to *remove* a MAC from
    the
    WPS db if they *never see* the nomap request.

    []

    I'm only watching this from the sidelines, as a (not-very-interested)
    observer.

    This is the first I've heard of a "nomap request".

    I'd been assuming Arlen/Marian's addition of "_nomap" to his (B?)SSID
    _was_ the "request", and was (by its nature) continuous.
    --
    J. P. Gilliver. UMRA: 1960/<1985 MB++G()ALIS-Ch++(p)Ar++T+H+Sh0!:`)DNAf

    Old professors don't fade away - they just lose their faculties.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From J. P. Gilliver@3:633/10 to All on Saturday, December 06, 2025 22:51:02
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025/12/6 0:24:4, Marian wrote:
    J. P. Gilliver wrote:
    I checked mine by name, and got

    (!)
    Invalid BSSID format. Expected 12 hexadecimal digits (e.g.,
    AA:BB:CC:DD:EE:FF)

    (Probably what the B means?)

    Hi John,

    You said you checked yours "by name", where the query that was suggested seems to be using the BSSID (which is in the format of "AA:BB:CC:DD:EE:FF")
    <https://wavedigger.networksurvey.app/?tab=bssid>

    Try entering your BSSID (i.e., your MAC address of the access point),
    which, on Windows, you can get using netsh using the syntax below:
    netsh wlan show networks mode=bssid

    I did that, and pasted the resulting string into https://wavedigger.networksurvey.app/?tab=bssid [and got

    (!)
    BSSID not found in Apple's database. This may be a new or unregistered
    access point.]

    But I thought your whole beef was that your BSSID was in the database,
    despite your having added "_nomap" to it. But you _can't_ add "_nomap"
    to a string of hex pairs.


    There are some WPS databases, as I noted in my prior post, which can take
    an SSID input, apparently, if that's what you really want to query on.
    <https://wifidb.net/wifidb/opt/search.php>

    If by that you mean I can use its name, I tried that page, just filling
    in its name - and nothing _seemed_ to happen when I clicked submit. Then
    after 20 seconds or so (when I retried, anyway), it came up with

    Search Results: 0 Points ( Save Link | Map | JSON | KMZ | GPX )

    . (So both wavedigger and wifidb didn't find me. Since they look like
    they're US-limited, I'm not surprised.)

    I haven't tried searching just for an SSID (since a BSSID is unique) and
    when I just tested it with an SSID, the gateway timed out, so maybe there isn't an SSID-only lookup, but that would be useful for those of us who
    want to stay out of the rainbow hash tables (& butterfly hash tables).



    --
    J. P. Gilliver. UMRA: 1960/<1985 MB++G()ALIS-Ch++(p)Ar++T+H+Sh0!:`)DNAf

    Old professors don't fade away - they just lose their faculties.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Alan@3:633/10 to All on Saturday, December 06, 2025 15:07:00
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 11:06, Marian wrote:
    Chris wrote:
    However, the "attribute" line shows up, so I can see some identifiers.

    Not true. Your replies always have the person's name. See above where is
    says "> Chris wrote". That's in the *body* of your reply so you can see it.

    That's exactly what I said.

    Me: I see the attribute (i.e., Chris wrote).
    You: Not true
    Me: Yes true.

    Except the attribute in the post was "Carlos wrote"...

    ...and then you proceeded assume it was Chris.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From J. P. Gilliver@3:633/10 to All on Sunday, December 07, 2025 10:23:00
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025/12/7 6:53:28, Marian wrote:
    J. P. Gilliver wrote:
    This is the first I've heard of a "nomap request".

    All the major players publish that they respect the "_nomap" request, where we've been discussing the _nomap keyword on these newsgroups since, oh, at least a decade or more.

    The post to which the above line was replying implied that there was a
    specific request one had to make, beyond just adding _nomap to your
    SSID. (Such as doing something on a web page or similar.)

    []

    I think this is a clear case for a class action lawsuit; but I'll give
    Apple all the information and I will require that Apple explain HOW my
    BSSID got into their WPS database, since that will let me know if it's just me or everyone who tries to opt out of Apple's insecure WPS database.

    Any timescale for when your class action will be issued? (And I wouldn't
    accept "it's just you" claims; see the [UK Post Office] "Horizon" scandal.)

    --
    J. P. Gilliver. UMRA: 1960/<1985 MB++G()ALIS-Ch++(p)Ar++T+H+Sh0!:`)DNAf

    "Bugger," said Pooh, feeling very annoyed.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Sunday, December 07, 2025 11:05:16
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    J. P. Gilliver <G6JPG@255soft.uk> wrote:
    On 2025/12/6 20:51:53, Chris wrote:

    []

    There isn't, as far as I can see, an obligation to *remove* a MAC from the >> WPS db if they *never see* the nomap request.

    []

    I'm only watching this from the sidelines, as a (not-very-interested) observer.

    This is the first I've heard of a "nomap request".

    I'd been assuming Arlen/Marian's addition of "_nomap" to his (B?)SSID
    _was_ the "request", and was (by its nature) continuous.

    Correct. It is the request.


    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From J. P. Gilliver@3:633/10 to All on Sunday, December 07, 2025 14:02:05
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025/12/7 11:5:16, Chris wrote:
    J. P. Gilliver <G6JPG@255soft.uk> wrote:
    On 2025/12/6 20:51:53, Chris wrote:

    []

    There isn't, as far as I can see, an obligation to *remove* a MAC from the >>> WPS db if they *never see* the nomap request.

    []

    I'm only watching this from the sidelines, as a (not-very-interested)
    observer.

    This is the first I've heard of a "nomap request".

    I'd been assuming Arlen/Marian's addition of "_nomap" to his (B?)SSID
    _was_ the "request", and was (by its nature) continuous.

    Correct. It is the request.

    In that case, I can't see how they could claim not to have seen it; if
    the SSID was in their system before it had the _nomap added, then surely
    _with_ the _nomap added, it is a new SSID; the same if they'd _not_ had
    it, and thus added it as a new one anyway. In both cases, at the point
    they added it, they would see it.

    The only way I can see they could claim not to have seen it, would be if
    people had SSIDs ending with _nomap _before_ they implemented that
    convention - but before that, why would people have had such SSIDs anyway!

    --
    J. P. Gilliver. UMRA: 1960/<1985 MB++G()ALIS-Ch++(p)Ar++T+H+Sh0!:`)DNAf

    You can't abdicate and eat it
    - attributed to Wallis Simpson, in Radio Times 14-20 January 2012.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Sunday, December 07, 2025 21:13:31
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-05 21:17, Carlos E.R. wrote:
    On 2025-12-05 20:11, Alan wrote:
    On 2025-12-05 04:08, Marian wrote:
    How to test if your access point BSSID is in the highly
    insecure Apple WPS database and, if it is in Apples insecure WPS
    database, what else is there.

    If you'd like me to test if your access point BSSID is in the
    Apple WPS database, then simply respond with that BSSID & I'll
    run the Windows scripts I just wrote based on research published
    recently of the flaws in Apple's methods (some of that research
    is listed in the signature below).

    Note that your BSSID should not be in Apple's database if you've
    opted out
    by appending "_nomap" to your access point SSID (e.g., "my.ssid_nomap"). >>>
    None of my access point BSSIDs are in the Apple database, but I
    have the optout keywords _optout_nomap appended to all of them,
    but once I confirm the process works, I'll be glad to write a
    tutorial so others can do it too.

    Let me know which BSSIDs you wish me to look up for you in Apple's WPS.

    Or, if you want to do it without involving Arlen:

    <https://wavedigger.networksurvey.app/?tab=bssid>

    I checked mine...

    (And I've been using the same router for more than 5 years)

    ...and surprise, surprise: it's not in there!

    Mine is.

    Curio: it is a new router that I put in service on October 9, so only
    two months ago. The SSID is of course the same one as the old one, but
    not the BSSID. That was a fast update.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Sunday, December 07, 2025 21:43:25
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 18:13, Marian wrote:
    Carlos E.R. wrote:
    It may be that by hiding my SSID broadcast, I prevented Apple from recognizing
    that the _nomap was appended to the SSID, for example.

    Maybe.

    Hi Carlos,

    I thank you for making me think about it, where the fact remains that we
    need to explain why a hidden SSID with "_nomap" is in the Apple WPS db.

    The BSSID is always in the broadcast packet but that the SSID field is
    "null" (or blank).

    Since the broadcast happens ten times a second, there's no doubt Apple products (of which I own many) are seeing the "BSSID", and, since these
    Apple devices are in my own home, they're seeing the "SSID in the clear" whenever a PC or mobile device handshakes with the access point.

    So, clearly, Apple *knows* that the SSID is hidden, and, Apple likely even knows the SSID, but Apple may have chosen to ignore these obvious facts.

    Hence, I take this loss of my privacy by Apple very seriously.
    What I need to do, moving forward, is gather more data points.

    What would be useful to know is if it's only me or if it's everyone.

    Sorry, I can't help with that. But yes, Apple should take the hint that
    if the SSID is hidden, they should not list the associated BSSID either.

    If you have a free unused/old router or access point, you could set it
    up with a hidden _nomap SSID, and without connecting any of your phones
    to it, wait to see if the BSSID appears listed after a month or two. It
    would be interesting to check every day with a script, to see how fast
    they update.


    But you yourself posted recently a list of databases, and the procedures
    to not get listed are quite different. _nomap in most of them, but
    actually writing to them to get yourself unlisted on some of them. Not
    very nice of them!

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Sunday, December 07, 2025 21:53:05
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 21:51, Chris wrote:
    Marian <marianjones@helpfulpeople.com> wrote:

    Donald changing his nym non-randomly to avoid killfiles noted. This was
    never about privacy.


    You spend all your time
    trying to protect your privacy and fail at the simplest level.

    Apple advertised that they would respect the _nomap suffix as an extremely >> clear and very obvious indication that we wished to not be in their db.

    That Apple put my BSSID in their database is an indication of their lack of >> moral rectitude.

    Firstly, the _nomap is on your user-defined SSID. Secondly, what is
    collected is the BSSID/MAC which in most cases cannot be edited.

    You can choose to hide your SSID. So if you've hidden your SSID the nomap option is superfluous as it won't show up anyway.

    There isn't, as far as I can see, an obligation to *remove* a MAC from the WPS db if they *never see* the nomap request.

    This is true, but they see that the SSID is hidden. This should be a
    hint no not list the BSSID either. This can be a bug, not malice.


    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Sunday, December 07, 2025 22:05:04
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 18:13, Marian wrote:
    Chris wrote:
    All we need to do that is a BSSID of an AP that isn't in your own home
    (because I understand nobody wanting their own home to be geolocated).

    There are maps which "geolocate" everyone's home.

    Since access points with "_nomap" are clearly in the Apple WPS database,
    this raises serious privacy concerns because the system can be abused to track homes and individuals globally (as reported by researchers).

    For you to claim all security researchers are wrong is classic.
    I, for one, trust the security professionals (and I read their papers).

    <https://www.cs.umd.edu/~dml/papers/wifi-surveillance-sp24.pdf>
    "In this work, we show that Apple's WPS implementation
    can easily be abused to create a serious privacy threat
    on a global scale."

    If it's that easy for anyone to look up where we live based only on our
    BSSID, then there's something horrid going on, don't you think?

    The only horrid[2] thing is how inept you are.

    Well, it's a good thing you Apple trolls are the only people claiming I'm "inept", especially given I happen to be well informed on privacy issues.

    I think the main reason you love to claim that I'm "inept" is because you
    are desperate to defend Apple's actions to the death, no matter what.

    Keeping your unique BSSID/GPS/SSID/dBm/timestamp/etc metadata out of the Apple WPS database simply by adding "_nomap" should be one of those things.

    For anyone to claim we have no right to privacy is to deny a fundamental human freedom. Privacy is not a luxury; it is a cornerstone of autonomy and dignity.

    I'm unsure about that.

    The only reference to privacy in the "Universal Declaration of Human
    Rights" is this:

    Article 12

    No one shall be subjected to arbitrary interference with his privacy,
    family, home or correspondence, nor to attacks upon his honour and
    reputation. Everyone has the right to the protection of the law against
    such interference or attacks.



    You would have to prove that your house BSSID being listed is a breach
    of your fundamental right to privacy, because an AP is not directly
    linked to your person.


    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Sunday, December 07, 2025 22:11:09
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-07 09:25, Marian wrote:
    J. P. Gilliver wrote:


    I'll tackle Google later. Right now I demand that Apple explain to my satisfaction why my access point is in their database when I opted out.

    That's easy: they do not see you SSID because it is hidden, so they do
    not see the _nomap in it.

    They should take the "hidden" part as indicative of not wanting to be
    listed, though. This can be a bug, not actual malice.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Sunday, December 07, 2025 22:24:53
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-06 01:24, Marian wrote:
    There are some WPS databases, as I noted in my prior post, which can take
    an SSID input, apparently, if that's what you really want to query on.
    <https://wifidb.net/wifidb/opt/search.php>

    Doesn't find mine.

    There is also a map, which can display my city in Spain, but it freezes
    when it reaches a resolution that might display wifis.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Sunday, December 07, 2025 22:36:43
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    J. P. Gilliver <G6JPG@255soft.uk> wrote:
    On 2025/12/7 11:5:16, Chris wrote:
    J. P. Gilliver <G6JPG@255soft.uk> wrote:
    On 2025/12/6 20:51:53, Chris wrote:

    []

    There isn't, as far as I can see, an obligation to *remove* a MAC from the >>>> WPS db if they *never see* the nomap request.

    []

    I'm only watching this from the sidelines, as a (not-very-interested)
    observer.

    This is the first I've heard of a "nomap request".

    I'd been assuming Arlen/Marian's addition of "_nomap" to his (B?)SSID
    _was_ the "request", and was (by its nature) continuous.

    Correct. It is the request.

    In that case, I can't see how they could claim not to have seen it; if
    the SSID was in their system before it had the _nomap added, then surely _with_ the _nomap added, it is a new SSID; the same if they'd _not_ had
    it, and thus added it as a new one anyway. In both cases, at the point
    they added it, they would see it.

    Not if the SSID is hidden.


    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Monday, December 08, 2025 08:13:37
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Andy Burns <usenet@andyburns.uk> wrote:
    Carlos E.R. wrote:

    Marian wrote:

    ÿ <https://wifidb.net/wifidb/opt/search.php>

    Doesn't find mine.

    Nor mine, by SSID name (not hidden or _nomap suffix)

    I wouldn't really expect anyone to have wardriven around here with a
    laptop running Vistumbler, but you never know ...

    Mine is and I would it expect it to be as it's not hidden nor nomapped.

    This isn't about wardriving. It is routine collection by Apple (and google) devices that are nearby.


    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Monday, December 08, 2025 13:02:48
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On December 6, I wrote:
    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-06 01:16, Marian wrote:
    It's classic for the Apple trolls to claim everything they can't understand is a "weak lie" as Jolly Roger just did, but the fact
    remains that my BSSID is in Apple's database (and the SSID is
    hidden & has "_nomap" appended).

    So all your efforts to hide yourself are for nothing. You are listed.
    You might as well not bother to hide! :-D

    Mine isn't listed and I did nothing to hide.

    I stand corrected (by myself :-)). It turns out my BSSID *is* listed
    (in <https://wavedigger.networksurvey.app/?tab=bssid>).

    Apparently my router reported (slightly) different MAC addresses than
    the MAC address (BSSID) of my SSID. When I used 'Arlen''s 'netsh wlan
    ...' method [1], I got the correct BSSID.

    The reported location is quite accurate - within some 10 metres or so
    - but useless, because I live in a city and in an appartment building,
    so there are hundreds of other Wi-Fi Access Points close by.

    As has been said before, trying to hide makes one suspect, because
    *other* factors stand out.

    [1] I think I had tried that [2] before, but it first failed saying to
    'Run as administrator', then it failed saying it needs 'Location
    services', but it still failed. Later it turned out that it also needed
    'Let apps access your location' to be switched on. (All on Windows 11.
    Settings -> Privacy & security -> Location.)

    [2] Something similar to "netsh wlan show networks mode=bssid". I think
    'Arlen' also posted a 'netsh' command which only reports the BSSID of
    the SSID you're connected to, instead of all the visible ones, but I
    didn't find that again.

    --- PyGate Linux v1.5.1
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, December 10, 2025 00:19:14
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-08 15:04, Marian wrote:
    Carlos E.R. wrote:
    Sorry, I can't help with that. But yes, Apple should take the hint
    that if the SSID is hidden, they should not list the associated BSSID
    either.

    If you have a free unused/old router or access point, you could set it
    up with a hidden _nomap SSID, and without connecting any of your
    phones to it, wait to see if the BSSID appears listed after a month or
    two. It would be interesting to check every day with a script, to see
    how fast they update.

    Andy Burns wrote:
    Ask some friends who use iPhones to come round for a coffee, the more
    devices hoovering up data the better?ÿ They may only add BSSIDs to the
    DB if they've seen them via multiple devices.

    I appreciate the input from both Carlos & Andy in that both of you seem to understand the problem set, which is I didn't consent to be tracked.
    a. I hid my SSID (which is a clear non-consent active action), and, b. I added _nomap to all my SSIDs (which is another active non consent).
    And yet, I'm in the Apple WPS database down to the middle of the house. (Wavedigger maps are accurate to 8 digits pinpointing the exact home!)

    The fact is that I have plenty of Apple devices in the home, maybe even
    more than Android devices, so I don't need to bring in more iPhones. :)

    We're all smart people so we can see that "something" is wrong. But what?

    It could be Apple (e.g., a bug).
    Or, it could be me (as Andy has intimated in a prior post).

    I've met with my neighbor who is a VP at Apple who knows me extremely well
    so he takes my claims seriously, so we'll find out soon if it's a bug.

    Or, it could be "something that I did"; but what?

    I'm thinking that I need to look more deeply at how repeaters and bridges pass BSSIDs. I'm not really all that familiar with how BSSIDs propagate.

    I'll dig a bit to see if maybe a repeater/bridge threw me under the bus.

    Doubtful.

    The SSID is the same, so would have the _nomap, but I'm unsure about the
    BSSID keeping or not.

    In any case, you can find out if the SSID is published or hidden by any
    of those repeaters/bridges. Just move near to each one of them, and
    query the laptop information. Make sure it is connected to it by
    comparing the strength of the signal.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, December 10, 2025 00:26:15
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-09 05:19, Marian wrote:
    Carlos E.R. wrote:
    ÿÿ As has been said before, trying to hide makes one suspect, because
    *other* factors stand out.

    I am curious, though, about why some people are listed and some are
    not. What's the criteria? Maybe just chance. A passerby having the
    proper non intentional software working properly, I'd guess.

    I will disagree with anyone who makes an illogical statement such as that which Frank made above, but I'll help answer any valid question such as
    what Carlos asked.

    Regarding Frank's assessment that hiding the SSID and putting _nomap on the SSID "makes one suspect"... Suggesting that opting out makes you 'suspect' flips the logic. In a system where consent is assumed unless you opt out, taking the opt-out step is the rational, privacy-protective choice.

    Yes, but it also signals "I have something to hide!". It makes you "interesting".


    ...

    3. A data broker can infer that the Johnsons moved across the country.
    ÿÿ Advertisers could target them with "new homeowner" services ads.
    ÿÿ A stalker or abusive ex could quickly discover their new address

    Yes, but there are other information avenues that give away that
    information to the public. Starting with the Johnsons talking on
    twitter. The mobile phone will also notice and register this information (gps), and it will be at least available in aggregate form.


    The BSSID is persistent across locations.
    That persistence means your router acts like a digital homing beacon.
    It follows you wherever you go.

    Now run that kind of tracking on millions of BSSIDs en masse, which is what security researched showed the insecure Apple WPS database can be used for.

    As for Carlos' question of why some people are in the highly insecure Apple WPS database, A router's BSSID is only logged if an Apple device (like an iPhone, iPad, or Mac) scans it and reports it back to Apple's servers. If
    no device running Apple's WPS software has ever passed near your router, it won't be listed.
    In my case, I have plenty of Apple mobile devices inside my home.
    So they threw me under the bus even if nobody else did it for Apple.

    The paper by Erik Rye & Dave Levin tracked BSSIDs over a year, where they mention that Apple doesn't seem to be scrubbing old BSSIDs out of the db.
    "we were able to track BSSIDs longitudinally over the course of a year"

    Ok.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, December 10, 2025 00:31:35
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-08 17:04, Marian wrote:
    Frank Slootweg wrote:
    On December 6, I wrote:
    Carlos E.R. <robin_listas@es.invalid> wrote:

    ...

    Notice something interesting:
    a. When you search using the URL, you get only six decimal places
    b. When you search using python, you get up to eight decimal places

    Here is a redacted set of images showing the decimal place issue: <https://i.postimg.cc/C5Pcb6RQ/decimal.jpg>

    Maybe those last two decimal places are why Frank sees an inaccuracy in location that is absolutely absent from my results, although everyone knows
    I live in the boonies so even as much as 10 meters off is still exactly me.

    But you said yourself you own Apple phones. Those will have reported you
    from inside the house, so very accurate. In my case, they report the
    location at the pavement where they see the signal, not the actual location.


    UPDATE: I just checked my actual numbers. 6 decimal places: ~11 cm resolution.
    8 decimal places: ~1 mm resolution.
    The specific difference between them is only about 4cm.

    What's really different is if you live in the boonies, the BSSID is you.

    No, it is still your home.

    If you're in the city, the BSSID might be you and people close to you.

    Note: It also matters how "close to your BSSID" the Apple devices are.
    In my case, they're right here, next to me, so they're close to the router.



    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Wednesday, December 10, 2025 00:37:24
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-08 14:50, Marian wrote:
    Carlos E.R. wrote:
    You would have to prove that your house BSSID being listed is a breach
    of your fundamental right to privacy, because an AP is not directly
    linked to your person.

    The simplistic argument that 'MAC addresses are not "directly" linked' ignores the fact that when aggregated at scale, they become a powerful tracking tool. A single MAC address is just a hardware identifier; but a database of millions of them tied to GPS coordinates is essentially a map
    of people's movements and residences.

    Imagine this scenario:
    1. A company collects BSSIDs (MACs) from Wi-Fi routers in a city. 2.
    Over time, they build a database: ÿ a. MAC A -> seen at 123 Elm Street
    in 2022 ÿ b. MAC A -> seen at 456 Oak Avenue in 2023
    3. From this, they infer the household at 123 Elm Street likely
    ÿ moved to 456 Oak Avenue.

    Now scale that up: Track migration patterns of entire neighborhoods. Correlate MACs with census data, property records, or advertising IDs.
    What was just public information becomes a de facto surveillance system, without meaningful consent from the people being tracked.

    Yes, this is true.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Wednesday, December 10, 2025 19:10:49
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-08 14:50, Marian wrote:
    [...]
    Imagine this scenario:
    1. A company collects BSSIDs (MACs) from Wi-Fi routers in a city. 2.
    Over time, they build a database: ? a. MAC A -> seen at 123 Elm Street
    in 2022 ? b. MAC A -> seen at 456 Oak Avenue in 2023
    3. From this, they infer the household at 123 Elm Street likely
    ? moved to 456 Oak Avenue.

    Now scale that up: Track migration patterns of entire neighborhoods. Correlate MACs with census data, property records, or advertising IDs.
    What was just public information becomes a de facto surveillance system, without meaningful consent from the people being tracked.

    Yes, this is true.

    No, it's not. As you said, it's not people, but households and, as
    others have said, it's not even households, but *devices* (Access
    Points).

    The *Access Point* has moved and that could be for all kinds of
    reasons. The AP might be re-used by someone else. The household may have
    been split up (someone(s) moved out), so the household did not move.
    Etc., etc..

    Devices are not people, at least not yet.

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Wednesday, December 10, 2025 19:30:39
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Frank Slootweg <this@ddress.is.invalid> wrote:
    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-08 14:50, Marian wrote:
    [...]
    Imagine this scenario:
    1. A company collects BSSIDs (MACs) from Wi-Fi routers in a city. 2.
    Over time, they build a database: ÿ a. MAC A -> seen at 123 Elm Street
    in 2022 ÿ b. MAC A -> seen at 456 Oak Avenue in 2023
    3. From this, they infer the household at 123 Elm Street likely
    ÿ moved to 456 Oak Avenue.

    Now scale that up: Track migration patterns of entire neighborhoods.
    Correlate MACs with census data, property records, or advertising IDs.
    What was just public information becomes a de facto surveillance system, >>> without meaningful consent from the people being tracked.

    Yes, this is true.

    No, it's not. As you said, it's not people, but households and, as
    others have said, it's not even households, but *devices* (Access
    Points).

    The *Access Point* has moved and that could be for all kinds of
    reasons. The AP might be re-used by someone else. The household may have
    been split up (someone(s) moved out), so the household did not move.
    Etc., etc..

    Devices are not people, at least not yet.

    Correct.


    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Thursday, December 11, 2025 07:20:54
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian <marianjones@helpfulpeople.com> wrote:
    Chris wrote:
    Devices are not people, at least not yet.

    Correct.

    If I had a pill in my pocket, you'd say it's a pill. It's not a cure. It's
    a pill. You can't see that if it's penicillin, it can cure you of strep throat.

    You and Frank never were accepted into a college for a reason, Chris.
    You don't own the IQ to understand a pill in my pocket is more than just a pill.

    What is it with you and these weird analogies?? Who cares if you have a
    pill in your pocket...?

    To you (and Frank), all pills are the same.
    Who is that strange?

    Only you are when making absurd defenses for Apple decisions.
    Nobody on the planet who is a security professional agrees with you two.

    Nobody.

    If they did, you'd find them.
    And you can't.

    Because your assessment that penicillin can't cure step throat because it's "just a pill" is absurd.

    I mean, it really can't. Penicillin is largely ineffectual following over-prescription. Plus, a single pill wouldn't cure anything; you need a course of at least a week of something like methicillin or phenoxicilin.

    Note: The "pill" is the analogy for the "bssid", which is more powerful
    than the item appears to be to people who don't understand what it does.

    So what is the penicillin in your analogy...??

    I think you've taken too many pills, Donald.




    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Frank Slootweg@3:633/10 to All on Thursday, December 11, 2025 14:40:52
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Andy Burns <usenet@andyburns.uk> wrote:
    Frank Slootweg wrote:

    The Access Point has moved and that could be for all kinds of
    reasons.

    Some access points are inside trains/buses/planes/ships/cars

    Yes, the assumption has been that we're talking about 'fixed' access
    points.

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Thursday, December 11, 2025 22:37:07
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-10 03:54, Marian wrote:
    Carlos E.R. wrote:
    Regarding Frank's assessment that hiding the SSID and putting _nomap
    on the
    SSID "makes one suspect"... Suggesting that opting out makes you
    'suspect'
    flips the logic. In a system where consent is assumed unless you opt
    out,
    taking the opt-out step is the rational, privacy-protective choice.

    Yes, but it also signals "I have something to hide!". It makes you
    "interesting".

    I never disagree with any sensibly valid point of view, so people never
    waste their time when they bring up a counterpoint with me, as I do understand what your're saying but we have to look at the scale of consent.

    There must be millions upon millions of people who do not consent to tracking, even as there must be billions who consent to tracking their AP.

    Huh, no. Maybe 80% of users do not even know they have that option.
    Their ISP gives them a router, they just plug it in, done.

    Only geeks and technical people know.

    ... trimming

    Ok

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Thursday, December 11, 2025 22:45:17
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-10 20:10, Frank Slootweg wrote:
    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-08 14:50, Marian wrote:
    [...]
    Imagine this scenario:
    1. A company collects BSSIDs (MACs) from Wi-Fi routers in a city. 2.
    Over time, they build a database: ÿ a. MAC A -> seen at 123 Elm Street
    in 2022 ÿ b. MAC A -> seen at 456 Oak Avenue in 2023
    3. From this, they infer the household at 123 Elm Street likely
    ÿ moved to 456 Oak Avenue.

    Now scale that up: Track migration patterns of entire neighborhoods.
    Correlate MACs with census data, property records, or advertising IDs.
    What was just public information becomes a de facto surveillance system, >>> without meaningful consent from the people being tracked.

    Yes, this is true.

    No, it's not. As you said, it's not people, but households and, as
    others have said, it's not even households, but *devices* (Access
    Points).

    The *Access Point* has moved and that could be for all kinds of
    reasons. The AP might be re-used by someone else. The household may have
    been split up (someone(s) moved out), so the household did not move.
    Etc., etc..

    Devices are not people, at least not yet.

    Ok, yes, we know that a device moved. We know that it could be a
    household, or it could be a car with a wifi hot spot. More data would be needed to make certain it is a household, like for example, the SSID was static for years, then moved. Still, it can be that the AP was recycled.

    There is no certainty, but a possibility.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Chris@3:633/10 to All on Friday, December 12, 2025 10:24:17
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-10 03:54, Marian wrote:
    Carlos E.R. wrote:
    Regarding Frank's assessment that hiding the SSID and putting _nomap
    on the
    SSID "makes one suspect"... Suggesting that opting out makes you
    'suspect'
    flips the logic. In a system where consent is assumed unless you opt
    out,
    taking the opt-out step is the rational, privacy-protective choice.

    Yes, but it also signals "I have something to hide!". It makes you
    "interesting".

    I never disagree with any sensibly valid point of view, so people never
    waste their time when they bring up a counterpoint with me, as I do
    understand what your're saying but we have to look at the scale of consent. >>
    There must be millions upon millions of people who do not consent to
    tracking, even as there must be billions who consent to tracking their AP.

    Huh, no. Maybe 80% of users do not even know they have that option.
    Their ISP gives them a router, they just plug it in, done.

    Only geeks and technical people know.

    I agree, although I'd say the number is nearer 99%. I have never ever seen
    a "_nomap" SSID and I have been aware of it for easily over 5 years.

    And when querying wifi networks almost none are changed from the ISP
    default.



    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Sunday, December 14, 2025 21:00:29
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-12 11:24, Chris wrote:
    Carlos E.R. <robin_listas@es.invalid> wrote:
    On 2025-12-10 03:54, Marian wrote:
    Carlos E.R. wrote:
    Regarding Frank's assessment that hiding the SSID and putting _nomap >>>>> on the
    SSID "makes one suspect"... Suggesting that opting out makes you
    'suspect'
    flips the logic. In a system where consent is assumed unless you opt >>>>> out,
    taking the opt-out step is the rational, privacy-protective choice.

    Yes, but it also signals "I have something to hide!". It makes you
    "interesting".

    I never disagree with any sensibly valid point of view, so people never
    waste their time when they bring up a counterpoint with me, as I do
    understand what your're saying but we have to look at the scale of consent. >>>
    There must be millions upon millions of people who do not consent to
    tracking, even as there must be billions who consent to tracking their AP. >>
    Huh, no. Maybe 80% of users do not even know they have that option.
    Their ISP gives them a router, they just plug it in, done.

    Only geeks and technical people know.

    I agree, although I'd say the number is nearer 99%. I have never ever seen
    a "_nomap" SSID and I have been aware of it for easily over 5 years.

    Right, but I meant the percent of people that know how to customize
    their rooter.

    Similarly, I don't recall ever seeing it.


    And when querying wifi networks almost none are changed from the ISP
    default.

    Around my house I see three customized of mine, one random (computer
    generated long random string), 3 "TP-Link..." one "ARRIS". So everybody
    else except the random one is using factory defaults. Or provider defaults.

    Using WiFi Analizer (Android) upstairs I see a few more, also generated
    by the ISP.




    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Carlos E.R.@3:633/10 to All on Tuesday, December 16, 2025 23:16:04
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-15 00:44, Marian wrote:
    Carlos E.R. wrote:
    And when querying wifi networks almost none are changed from the ISP
    default.

    Around my house I see three customized of mine, one random (computer
    generated long random string), 3 "TP-Link..." one "ARRIS". So
    everybody else except the random one is using factory defaults. Or
    provider defaults.

    Using WiFi Analizer (Android) upstairs I see a few more, also
    generated by the ISP.


    Hi Carlos,

    If you want, you can give me a BSSID of one of the homes near you, and
    thanks to Chris who asked me to do it, I can output the nearest 400
    BSSID:GPS pairs in that area.

    That would reveal my location to the world :-)

    If desired, I can "snowball" it even further, to get the nearest 400 to the outside ring, which will instantly extend to thousands within seconds.

    If you're OK with that, I'll post those thousands so that Chris (and others who may not have understood what the researchers reported) will see that.

    All I need to do is run the now-modified Apple BSSID locator code: <https://github.com/darkosancanin/apple_bssid_locator>
    where the main change I made to the apple_bssid_locator.py was
    FROM: apple_wloc.return_single_result = 1 (which means return only one)
    TO:ÿÿ apple_wloc.return_single_result = 0 (which means unlimited returns)

    In practice, "unlimited" really means Apple throttles returns at 400.
    All this I learned from reading the research that was posted about this.

    With the changes I documented, anyone in the world can reproduce what the security researchers said could be done, which I thank Chris for making me
    do it (because it took about a half hour for me to figure out that change).

    Now when I run this command using the modified apple_bssid_locator.py code python apple_bssid_locator.py 11:22:33:AA:BB:CC --all
    I get up to 400 BSSID:GPS pairs per query.

    If ANYONE wants to give me a BSSID of their neighbor, just post it.
    I will run the query for them and report the results here for all to see.

    As the researchers stated, it's trivial to "snowball" that query with automation to the point in two weeks the researchers had billions of GPS:BSSID pairs, which then they could use to track "households".

    It's so easy to do, it's scary.
    Just have someone give me a BSSID and I'll prove it to all right now.

    I don't doubt it.

    --
    Cheers, Carlos.
    ES??, EU??;

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Alan@3:633/10 to All on Sunday, December 28, 2025 20:55:12
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-28 16:14, Marian wrote:
    Andy Burns wrote:
    Nor mine, by SSID name (not hidden or _nomap suffix)

    I wouldn't really expect anyone to have wardriven around here with a
    laptop running Vistumbler, but you never know ...

    Hi Andy,
    In the United States, it's a public record where everyone who owns a home lives, so there's a 1:1 relationship between them and their router.

    Only assuming the accuracy of the database...

    ...which isn't accurate...

    ...because devices that AREN'T in the supposed location of an AP are
    reporting that one is NEAR their actual location.

    Cybernews: *Anyone can tap into your WiFi location data to track you* explains how Apple's WPS can be exploited for mass surveillance. <https://cybernews.com/privacy/apple-beams-wifi-location-data-privacy- risk/>

    The researchers already showed anyone in the world is already able to use Apple's WPS db to track Loretta Anne Jameson's AP which is currently
    located at 4302 Josey Circle, Shreveport, LA 71109.

    How do you know that?

    When she moves, I'll let you know where she moves her router to.
    Likewise with any of her neighbors.

    Ronda and Alfred Beel, 4310 Josey Cir, Unit #2-A
    Benjamin and Eric Choyica 1/4 and, 4318 Josey Cir, Unit #2-A
    Jeffrey Devin, 4306 Josey Cir, Unit #2-A
    Flora Ann Jackson Gellion, 4338 Josey Cir, Unit #2-A
    Lonzie D. Groniger, 4321 Josey Cir, Unit #2-A
    Lutrisher Walton Hill, 4329 Josey Cir, Unit #2-A
    Melvin Hawthorn, Jr. 1/2 and, 4823 Josey Cir, Unit #2-A
    Mary E. Gebbs Hendy, 4816 Josey Cir, Unit #2-A
    Shane Jameson Sr., 4330 Josey Cir, Unit #2-A
    Rosemary Ellerbee Jones, 4317 Josey Cir, Unit #2-A
    Charles Nesh, 4824 Josey Cir, Unit #2-A
    James and Dollie Henson Smythe, 4314 Josey Cir, Unit #2-A
    Sherryn Marie Smythe, 4820 Josey Cir, Unit #2-A
    Terrince Steedman, 4326 Josey Cir, Unit #2-A
    Pamela Tomas, 4828 Josey Cir, Unit #2-A
    Trivia Yashica Watken, 4827 Josey Cir, Unit #2-A
    etc.

    Anyone can do this for any home in the United States.
    Which is why this is so dangerous to privacy.


    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Tyrone@3:633/10 to All on Monday, December 29, 2025 15:12:36
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On Dec 28, 2025 at 11:55:12?PM EST, "Alan" <nuh-uh@nope.com> wrote:

    On 2025-12-28 16:14, Marian wrote:
    Andy Burns wrote:
    Nor mine, by SSID name (not hidden or _nomap suffix)

    I wouldn't really expect anyone to have wardriven around here with a
    laptop running Vistumbler, but you never know ...

    Hi Andy,
    In the United States, it's a public record where everyone who owns a home
    lives, so there's a 1:1 relationship between them and their router.

    Only assuming the accuracy of the database...

    ...which isn't accurate...

    ...because devices that AREN'T in the supposed location of an AP are reporting that one is NEAR their actual location.

    And STILL assuming that a moving router ALWAYS indicates the person moved. MUCH more likely that the router was sold/given away.

    Not to mention that since their are "public records where everyone who owns a home
    lives" then what is this router adding anyway? If you know where I live, why does the router even matter?

    The answer to that is obvious. It only matters because Arlen thinks it makes Apple "look bad".

    Which is Arlen's lifelong quest.

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Hank Rogers@3:633/10 to All on Monday, December 29, 2025 17:52:51
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian wrote on 12/29/2025 4:04 PM:
    Tyrone wrote:
    it makes Apple "look bad".

    What Apple does is what "makes Apple look bad", not me.

    What's important is that Apple's WPS database implementation is
    insecure. That's not opinion. That's fact which was described in the research.

    Google's WPS database access is nothing like Apple's WPS database access. Anyone in the world can access Apple's entire WPS db without restriction.

    All I did was reproduce what the researchers said was easily possible.
    And it was.

    What the researchers didn't note, and which I learned, and I'm likely only one out of millions who knows this, was not only does Apple not respect
    their own published privacy policy on opting out, but they have no
    intention of respecting their published privacy opt-out policy.

    This is not opinion.
    This is fact.

    Only one out of millions of people know what I just said above.
    We know it because we're extremely intelligent and well informed.

    Bear in mind if Google or Mozilla did what Apple did, I would be on their case too, because what Apple is doing is the antithesis of what Apple
    "says" it does.

    It's legally, morally & ethically reprehensible what Apple is doing.
    If Google or Mozilla did what Apple does, I'd say the same of them.

    But they didn't.
    Only Apple does this.

    So, I have to ask ... WHY aren't you taking any positive action marion?

    Anonymously Posting rubbish on usenet will not help us, nor you. Apple doesn't even read it, let alone anyone that could intervene.

    I realize you are a secret agent and must maintain your privacy to top
    secret level, but surely you realize few can even read your secret stuff.

    You are pissing up a rainpipe, Marion 007.

    This message will self-destruct in 3 seconds ... sssssss.


    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Hank Rogers@3:633/10 to All on Monday, December 29, 2025 18:45:38
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian wrote on 12/29/2025 4:04 PM:
    Tyrone wrote:
    it makes Apple "look bad".

    What Apple does is what "makes Apple look bad", not me.

    What's important is that Apple's WPS database implementation is
    insecure. That's not opinion. That's fact which was described in the research.

    Google's WPS database access is nothing like Apple's WPS database access. Anyone in the world can access Apple's entire WPS db without restriction.

    All I did was reproduce what the researchers said was easily possible.
    And it was.

    What the researchers didn't note, and which I learned, and I'm likely only one out of millions who knows this, was not only does Apple not respect
    their own published privacy policy on opting out, but they have no
    intention of respecting their published privacy opt-out policy.

    This is not opinion.
    This is fact.

    Only one out of millions of people know what I just said above.

    Thank goodness! If only a few people and yourself know this, the rest
    of us likely have some time left.

    We know it because we're extremely intelligent and well informed.


    Your superior intellect is well known Marion. But who are the others in
    the "We"?

    I'm sure everyone would like to thank this genius cadre for their efforts.

    No, on second thought perhaps not. I'm sure all these people are
    cloaked in secrecy, and we should do nothing to blow their cover.


    This message will self destruct in 3 seconds.




    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)