<div dir="ltr"><br><br><div class="gmail_quote">On Wed, Apr 6, 2011 at 10:26 AM, shimi <span dir="ltr"><<a href="mailto:linux-il@shimi.net">linux-il@shimi.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div dir="ltr"><br><div class="gmail_quote"><div>Changing your MAC is pretty trivial...<br></div></div></div></blockquote><div><br></div><div>Yeah, but guessing which MAC is in my whitelist is less so. So if an attacker want to spoof his MAC address he has to sniff for a MAC address, (which means he can do that only when my computer is on). I'm not familiar with the WiFi protocol, but I'm sending the MAC only in the handshake phase it's even harder to spoof your MAC.</div>
<div><br></div><div>I'm not trying to avoid the NSA, the attack vector I'm trying to prevent is a random vandals. A vicious attacker can simply knock on my door and ask to use my computer to check when his flight is leaving.</div>
</div></div>