• Re: How to test if your access point BSSID is in the highly insecure Ap

    From Alan@3:633/10 to All on Sun Dec 28 20:55:12 2025
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On 2025-12-28 16:14, Marian wrote:
    Andy Burns wrote:
    Nor mine, by SSID name (not hidden or _nomap suffix)

    I wouldn't really expect anyone to have wardriven around here with a
    laptop running Vistumbler, but you never know ...

    Hi Andy,
    In the United States, it's a public record where everyone who owns a home lives, so there's a 1:1 relationship between them and their router.

    Only assuming the accuracy of the database...

    ...which isn't accurate...

    ...because devices that AREN'T in the supposed location of an AP are
    reporting that one is NEAR their actual location.

    Cybernews: *Anyone can tap into your WiFi location data to track you* explains how Apple's WPS can be exploited for mass surveillance. <https://cybernews.com/privacy/apple-beams-wifi-location-data-privacy- risk/>

    The researchers already showed anyone in the world is already able to use Apple's WPS db to track Loretta Anne Jameson's AP which is currently
    located at 4302 Josey Circle, Shreveport, LA 71109.

    How do you know that?

    When she moves, I'll let you know where she moves her router to.
    Likewise with any of her neighbors.

    Ronda and Alfred Beel, 4310 Josey Cir, Unit #2-A
    Benjamin and Eric Choyica 1/4 and, 4318 Josey Cir, Unit #2-A
    Jeffrey Devin, 4306 Josey Cir, Unit #2-A
    Flora Ann Jackson Gellion, 4338 Josey Cir, Unit #2-A
    Lonzie D. Groniger, 4321 Josey Cir, Unit #2-A
    Lutrisher Walton Hill, 4329 Josey Cir, Unit #2-A
    Melvin Hawthorn, Jr. 1/2 and, 4823 Josey Cir, Unit #2-A
    Mary E. Gebbs Hendy, 4816 Josey Cir, Unit #2-A
    Shane Jameson Sr., 4330 Josey Cir, Unit #2-A
    Rosemary Ellerbee Jones, 4317 Josey Cir, Unit #2-A
    Charles Nesh, 4824 Josey Cir, Unit #2-A
    James and Dollie Henson Smythe, 4314 Josey Cir, Unit #2-A
    Sherryn Marie Smythe, 4820 Josey Cir, Unit #2-A
    Terrince Steedman, 4326 Josey Cir, Unit #2-A
    Pamela Tomas, 4828 Josey Cir, Unit #2-A
    Trivia Yashica Watken, 4827 Josey Cir, Unit #2-A
    etc.

    Anyone can do this for any home in the United States.
    Which is why this is so dangerous to privacy.


    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Tyrone@3:633/10 to All on Mon Dec 29 15:12:36 2025
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    On Dec 28, 2025 at 11:55:12?PM EST, "Alan" <nuh-uh@nope.com> wrote:

    On 2025-12-28 16:14, Marian wrote:
    Andy Burns wrote:
    Nor mine, by SSID name (not hidden or _nomap suffix)

    I wouldn't really expect anyone to have wardriven around here with a
    laptop running Vistumbler, but you never know ...

    Hi Andy,
    In the United States, it's a public record where everyone who owns a home
    lives, so there's a 1:1 relationship between them and their router.

    Only assuming the accuracy of the database...

    ...which isn't accurate...

    ...because devices that AREN'T in the supposed location of an AP are reporting that one is NEAR their actual location.

    And STILL assuming that a moving router ALWAYS indicates the person moved. MUCH more likely that the router was sold/given away.

    Not to mention that since their are "public records where everyone who owns a home
    lives" then what is this router adding anyway? If you know where I live, why does the router even matter?

    The answer to that is obvious. It only matters because Arlen thinks it makes Apple "look bad".

    Which is Arlen's lifelong quest.

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Hank Rogers@3:633/10 to All on Mon Dec 29 17:52:51 2025
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian wrote on 12/29/2025 4:04 PM:
    Tyrone wrote:
    it makes Apple "look bad".

    What Apple does is what "makes Apple look bad", not me.

    What's important is that Apple's WPS database implementation is
    insecure. That's not opinion. That's fact which was described in the research.

    Google's WPS database access is nothing like Apple's WPS database access. Anyone in the world can access Apple's entire WPS db without restriction.

    All I did was reproduce what the researchers said was easily possible.
    And it was.

    What the researchers didn't note, and which I learned, and I'm likely only one out of millions who knows this, was not only does Apple not respect
    their own published privacy policy on opting out, but they have no
    intention of respecting their published privacy opt-out policy.

    This is not opinion.
    This is fact.

    Only one out of millions of people know what I just said above.
    We know it because we're extremely intelligent and well informed.

    Bear in mind if Google or Mozilla did what Apple did, I would be on their case too, because what Apple is doing is the antithesis of what Apple
    "says" it does.

    It's legally, morally & ethically reprehensible what Apple is doing.
    If Google or Mozilla did what Apple does, I'd say the same of them.

    But they didn't.
    Only Apple does this.

    So, I have to ask ... WHY aren't you taking any positive action marion?

    Anonymously Posting rubbish on usenet will not help us, nor you. Apple doesn't even read it, let alone anyone that could intervene.

    I realize you are a secret agent and must maintain your privacy to top
    secret level, but surely you realize few can even read your secret stuff.

    You are pissing up a rainpipe, Marion 007.

    This message will self-destruct in 3 seconds ... sssssss.


    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Hank Rogers@3:633/10 to All on Mon Dec 29 18:45:38 2025
    Subject: Re: How to test if your access point BSSID is in the highly insecure Apple WPS database

    Marian wrote on 12/29/2025 4:04 PM:
    Tyrone wrote:
    it makes Apple "look bad".

    What Apple does is what "makes Apple look bad", not me.

    What's important is that Apple's WPS database implementation is
    insecure. That's not opinion. That's fact which was described in the research.

    Google's WPS database access is nothing like Apple's WPS database access. Anyone in the world can access Apple's entire WPS db without restriction.

    All I did was reproduce what the researchers said was easily possible.
    And it was.

    What the researchers didn't note, and which I learned, and I'm likely only one out of millions who knows this, was not only does Apple not respect
    their own published privacy policy on opting out, but they have no
    intention of respecting their published privacy opt-out policy.

    This is not opinion.
    This is fact.

    Only one out of millions of people know what I just said above.

    Thank goodness! If only a few people and yourself know this, the rest
    of us likely have some time left.

    We know it because we're extremely intelligent and well informed.


    Your superior intellect is well known Marion. But who are the others in
    the "We"?

    I'm sure everyone would like to thank this genius cadre for their efforts.

    No, on second thought perhaps not. I'm sure all these people are
    cloaked in secrecy, and we should do nothing to blow their cover.


    This message will self destruct in 3 seconds.




    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)