-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmac-addresses-udids-and-privacy.html
256 lines (256 loc) · 20.9 KB
/
mac-addresses-udids-and-privacy.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
<!doctype html><html lang=en>
<head>
<meta charset=utf-8>
<meta http-equiv=x-ua-compatible content="chrome=1">
<meta name=HandheldFriendly content="True">
<meta name=MobileOptimized content="320">
<meta name=viewport content="width=device-width,initial-scale=1">
<meta name=referrer content="no-referrer">
<meta name=description content="Adam Drake is an advisor to scale-up tech companies. He writes about ML/AI/crypto/data, leadership, and building tech teams.">
<title>
MAC Addresses, UDIDs, and Privacy - Adam Drake
</title>
<link rel="shortcut icon" href=/static/favicon.ico>
<link rel=stylesheet href=https://adamdrake.com/css/main.min.be12b679e5899a8805bab6348a0b4d7dc70275c3a131afa9cf3753df691719da.css integrity="sha256-vhK2eeWJmogFurY0igtNfccCdcOhMa+pzzdT32kXGdo=" media=screen>
<meta name=twitter:card content="summary_large_image">
<meta name=twitter:image content="https://adamdrake.com/static/images/twitter-card.jpg">
<meta name=twitter:title content="MAC Addresses, UDIDs, and Privacy">
<meta name=twitter:description content="There has been quite a bit of fuss in the days since Apple started rejecting apps that make use of the UDID. The deprecation was announced months ago, but the rejection started without warning and was a surprise to some. Firms that had been planning for the change typically already had multiple secondary solutions in place, many of which rely on using the Media Access Control (MAC) address from the wireless network interface controller (wireless NIC) on the device.">
<meta property="og:title" content="MAC Addresses, UDIDs, and Privacy">
<meta property="og:description" content="There has been quite a bit of fuss in the days since Apple started rejecting apps that make use of the UDID. The deprecation was announced months ago, but the rejection started without warning and was a surprise to some. Firms that had been planning for the change typically already had multiple secondary solutions in place, many of which rely on using the Media Access Control (MAC) address from the wireless network interface controller (wireless NIC) on the device.">
<meta property="og:type" content="article">
<meta property="og:url" content="https://adamdrake.com/mac-addresses-udids-and-privacy.html"><meta property="og:image" content="https://adamdrake.com/static/images/twitter-card.jpg"><meta property="article:section" content="posts">
<meta property="article:published_time" content="2012-04-06T00:00:00+00:00">
<meta property="article:modified_time" content="2012-04-06T00:00:00+00:00">
</head>
<body>
<div class=title-box>
<div class=title-left>
<h1 class=name><a href=/>Adam Drake</a></h1>
</div>
<div class=title-right>
<div class=social-icons>
<a href=https://github.com/adamdrake>
<img class=icon src=data:image/png;base64,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 width=64 height=64>
</a>
<a href=https://twitter.com/aadrake>
<img class=icon src=data:image/png;base64,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 width=64 height=64>
</a>
<a href=https://linkedin.com/in/aadrake>
<img class=icon src=data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABoAAAAaCAYAAACpSkzOAAAAzElEQVRIie2WWxGDMBBFVwISkIAEnBQJOCoOKqE4AAeNg+Lg9AOY2VmSTls29If7eTPJmbubl8gioAEG/DQAF9ECOkeA1VUnya1GgPEA0CARs2dO2QLBi2RBAShU78pcoF6MgCkH6AlUClJ7QGKgFXYD7l6QFOhbBeYN9Hb3bkCRHqX8CaiNV6aAe0CV9Ra/IHIsfgapRYuIv7lt9iTSi7VmbHP+9oB0eR6peR6gj+adoBP0X9ART/l43OdkiZnzu9XZmjb4lnFkTSIiLyov4WUSpGLDAAAAAElFTkSuQmCC width=64 height=64>
</a>
<a href=/index.xml>
<img class=icon src=data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABoAAAAaCAYAAACpSkzOAAABOElEQVRIib2WXXWEMBBGIyESkICDroPWQSNhHRQnrANwsOsAHFAJdXD7ALSz0wmZLrTfObwwkDs/X3ISwiIgAQPHaQBegxRwORCg1cpK/lopAKN6eQEaoAduwPsBoCFoSDAEVMDZSMotF0hBT8yV7gIBtMAb8Aw8ATEDTMDHHpClDm3VGVbjbKcXtGrSQCB6YL8FreoQLfXALJC099bPg4LVbMys6DpmazdOWHbzu+29AK0KO/Wdaf2SvaNaJGKfi0ntMxfIApcGP6mEflTudd0E1KqNWrKq86OgFSYr0wbplQMfBoEwC3ZVMpG7U98C3ZZFKmwHZRcDTjn3WaCqkPWLiPfemAWKBVCzMadszAJd+W7d1YjLOek9lY2ZnneoXR5vbPy/y0mmBUfqq50rLLHj8mFoRJwWnzknvtUm1yWnAAAAAElFTkSuQmCC width=64 height=64>
</a>
</div>
<div class=subscribe>
<a href=https://www.digitalmaneuver.com/#/portal>Subscribe to my newsletter</a>
</div>
</div>
</div>
<div class="nav-box row">
<div class=nav-left-menu>
<ul>
<li><a href=/>Latest</a> | </li>
<li><a href=/about.html>About</a> | </li>
<li><a href=/cases.html>Case Studies</a> | </li>
<li><a href=/contact.html>Contact</a> | </li>
<li><a href=/press.html>Press</a></li>
</ul>
</div>
</div>
<section class=section>
<div class=container>
<a href=https://applybyapi.com><button class=btn>Struggling to hire developers? Check out ApplyByAPI!</button></a>
<h1 class=page-title>MAC Addresses, UDIDs, and Privacy</h1>
<h2 class=content-date>April 6, 2012</h2>
<div class=share-links>
Share this:
<a class=twitter-share-button href="https://twitter.com/intent/tweet?text=Read%20MAC%20Addresses%2c%20UDIDs%2c%20and%20Privacy%20https%3a%2f%2fadamdrake.com%2fmac-addresses-udids-and-privacy.html" onclick="return window.open(this.href,'twitter-share','width=550,height=235'),!1">
twitter
</a> //
<a class=icon-facebook href="https://www.facebook.com/sharer/sharer.php?u=https%3a%2f%2fadamdrake.com%2fmac-addresses-udids-and-privacy.html" onclick="return window.open(this.href,'facebook-share','width=580,height=296'),!1">
facebook
</a> //
<a class=icon-linkedin href="https://www.linkedin.com/shareArticle?mini=true&url=https://adamdrake.com&title=MAC%20Addresses%2c%20UDIDs%2c%20and%20Privacy&source=Adam%20Drake" onclick="return window.open(this.href,'linkedin-share','width=980,height=980'),!1">
linkedin
</a> //
<a class=icon-google-plus href="https://plus.google.com/share?url=https%3a%2f%2fadamdrake.com%2fmac-addresses-udids-and-privacy.html" onclick="return window.open(this.href,'google-plus-share','width=490,height=530'),!1">
google+
</a>
</div>
<div class=content>
<p>There has been quite a bit of fuss in the days since Apple started
rejecting apps that make use of the UDID. The deprecation was announced
months ago, but the rejection started without warning and was a surprise
to some. Firms that had been planning for the change typically already
had multiple secondary solutions in place, many of which rely on using
the Media Access Control (MAC) address from the <a href=https://en.wikipedia.org/wiki/Wireless_network_interface_controller>wireless network
interface controller</a> (wireless NIC) on the device. There have since
been complaints that this is just as much of a privacy problem as using
the UDID that Apple banned access to (keep in mind, they still have
access to it), but these complaints demonstrate a lack of understanding
on what a MAC address is, why it exists, and most notably the fact that
it is transmitted in a plainly-readable form that can be viewed by every
other device on any network to which you are connected.</p>
<h3 id=some-background-on-mac-addresses class=anchor-link><a href=#some-background-on-mac-addresses>Some background on MAC addresses</a></h3>
<p>MAC stands for <a href=https://en.wikipedia.org/wiki/Media_access_control>Media Access Control</a>, and it is a
special identifier that is assigned by the manufacturer to every NIC
inside electronic devices. In theory, every NIC in every device has a
unique MAC address assigned to it. This has been the case for decades,
so there is nothing new or revolutionary going on here. If you have a
laptop with an ethernet NIC (where you plug in a cable to get on a
network) and a wireless NIC (so that you can access wireless networks),
and a Bluetooth controller (for keyboards, mice, etc.) then your laptop
will have three distinct MAC addresses, one for each NIC. These MAC
addresses are used to route the information from your device to other
devices or points on the network. The MAC address is somewhat like a
return address written on a letter, and due to its importance for
network communication, it isn’t going anywhere any time soon. Any time
you send any information over the network, say to access a web page,
check your email, or any other task, this information is broken up into
tiny chunks, and each chunk contains information about where it came
from and where it’s going. Maybe a more concrete example would better
illustrate how this works.</p>
<p>Say you want to mail a big book to a friend. If you used the same method
to send the book that your electronic device uses to surf the web, then
you wouldn’t just send one big book in one big box. What your
computer/iPhone/whatever does is splits the book into stacks of say, 20
pages. Then it puts each stack of pages into its own envelope and writes
your friend’s address and the return address (yours), so that your
friend knows where the letter came from. It also writes a number on each
envelope so that your friend can reassemble the pages inside the
envelopes in the correct order and make sure that they received all the
envelopes required to reconstruct the complete book. People are not
shocked by the fact that anyone who happens to see one of the envelopes
will also see the addressing information that you wrote on them.</p>
<p>This process works just the same when electronic devices communicate.
The difference is that the address of the sender and recipient are not a
name, street, city, and country. They are other identifiers, one of
which is the MAC address of your NIC. In general these pieces of
information can be seen by everyone who is on the same network as you,
and in some cases even people outside your network. In order words, if
you are surfing the web on your phone using a wireless network in a
coffee shop, then everyone else who is connected to that wireless network
can see your MAC address, and you can see theirs too. It’s 100%,
completely, public. It is not encrypted, anonymized, or otherwise
abstracted. The MAC address from your device is broadcasted as clear as
if you wrote it on a huge piece of paper and held it above your head.
Everyone could easily read it, and they’d think you were crazy if you
yelled at them for doing so. They would probably already think you were
crazy for writing a MAC address on a huge piece of paper and holding it
over your head, but you get my point.</p>
<h3 id=the-privacy-problem class=anchor-link><a href=#the-privacy-problem>The Privacy Problem</a></h3>
<p>So then the question becomes, is making use of information someone has
publicized actually a privacy problem? I am guessing that most people
who are raising the privacy issue in relation to the usage MAC addresses
don’t realize that the MAC address is being constantly broadcast by
their device any time they are doing anything on any network. User
privacy is important, and that’s why I fully advocate that companies
making use of the MAC address should anonymize it first. By doing so
they are voluntarily protecting the user.</p>
<p>From the opposite perspective, there is no way to easily disable or
change a MAC address. You can pretend to have a different one, called
<a href=https://en.wikipedia.org/wiki/MAC_spoofing>MAC Spoofing</a>, but it isn’t always easy or possible to do so. In that
sense, anyone who is using a device connected to some network doesn’t
really have a choice in regards to the visibility of their MAC address.
The MAC address exists and has for decades, it’s pretty much required in
order for most devices to communicate, and there is nothing you can
easily do to get rid of it. In that sense, using the MAC address as a
device identifier poses the same problems as the UDID.</p>
<p>The big problem here is something that is very common when technology
and privacy intersect. People don’t understand the details of how the
technology works, and for the most part they don’t really care. This
causes people to use features that probably aren’t good for their
privacy even though they shouldn’t. This ignorance also causes them to
freak out about things that don’t really have as much of an impact on
their privacy, because they don’t understand the technology and this
lack of understanding results in fear. They will go along happily using
their iPhone, checking in with Foursquare, which is cross-posted to
their Facebook (or they check in with Facebook directly), and they tweet
pictures with Instagram, and they think nothing of doing all of this. In
reality, they are giving away an amazing amount of information about who
they are, where they are, and what they are doing.</p>
<p>For example, if you are checking in with Facebook or Foursquare then
people know where you are and where you aren’t. If you have personal
photos on your (likely public) Facebook profile then someone can easily
just go to wherever you are (since you checked in), wait for you to come
out (since they have your photo), and follow you around. They could
follow you home, wait until you leave again, see that you have checked
in at work, and proceed to steal all your possessions. People are
voluntarily sharing all these things, this data that could be formed
into a very real threat, and people seem to be perfectly comfortable
with that. Why? You could make the argument that people are comfortable
sharing so much information because they are choosing to do so, but
that’s not really a good argument if the choice is not a well-informed
one. I would advise people to visit the <a href=https://www.eff.org>Electronic Frontier Foundation</a>
(EFF), which has a specific page set up for <a href=https://www.eff.org/issues/social-networks>social network privacy
and security</a>. As is often the case, the privacy argument all comes
down to user education. They never knew anything about MAC addresses,
and now they’re unhappy that there is some unique token that is tied to
their device. They just didn’t know that it’s been this way all along.</p>
<h3 id=conclusion class=anchor-link><a href=#conclusion>Conclusion</a></h3>
<p>So using UDIDs is not possible anymore, and that isn’t a bad thing. Many
companies have switched to alternative methods, including using an
anonymized version of the MAC address. The MAC address is a necessary
part of communication between networked devices and is readable by all
devices on the same network (and always has been), so taking the step to
anonymize it (which every company should) is actually a step up for user
privacy.</p>
<p>You don’t get to drive a car without license plates, you don’t get to
send letters without writing an address on them, and you don’t really
get to connect electronic devices to a network without a MAC address.
You do get to choose if you will drive, write letters, or surf the web,
and in these situations the user still does have the choice to opt-out.
Whether or not they feel the risks outweigh the benefits is something
only they can decide, but that decision should be an informed one. In
the meantime, companies making use of the MAC address should keep in
mind user privacy concerns, should always hash the MAC address so they
are not accessing the original, and should take all possible steps to
facilitate privacy and transparency for users.</p>
</div>
</div>
</section>
<div class="nav-box row">
<div class=nav-left-menu>
<ul>
<li><a href=/>Latest</a> | </li>
<li><a href=/about.html>About</a> | </li>
<li><a href=/cases.html>Case Studies</a> | </li>
<li><a href=/contact.html>Contact</a> | </li>
<li><a href=/press.html>Press</a></li>
</ul>
</div>
</div>
<div class="footer-box row">
<div class="footer-left col-md-6 col-xs-12">
<div class="footer-bio content">
<p><strong>Adam Drake</strong> leads technical business transformations in global and multi-cultural environments. He has a passion for helping companies become more productive by improving internal leadership capabilities, and accelerating product development through technology and data architecture guidance. Adam has served as a White House Presidential Innovation Fellow and is an IEEE Senior Member.</p>
</div>
</div>
<div class=footer-right>
<div class=social-icons>
<a href=https://github.com/adamdrake>
<img class=icon src=data:image/png;base64,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 width=64 height=64>
</a>
<a href=https://twitter.com/aadrake>
<img class=icon src=data:image/png;base64,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 width=64 height=64>
</a>
<a href=https://linkedin.com/in/aadrake>
<img class=icon src=data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABoAAAAaCAYAAACpSkzOAAAAzElEQVRIie2WWxGDMBBFVwISkIAEnBQJOCoOKqE4AAeNg+Lg9AOY2VmSTls29If7eTPJmbubl8gioAEG/DQAF9ECOkeA1VUnya1GgPEA0CARs2dO2QLBi2RBAShU78pcoF6MgCkH6AlUClJ7QGKgFXYD7l6QFOhbBeYN9Hb3bkCRHqX8CaiNV6aAe0CV9Ra/IHIsfgapRYuIv7lt9iTSi7VmbHP+9oB0eR6peR6gj+adoBP0X9ART/l43OdkiZnzu9XZmjb4lnFkTSIiLyov4WUSpGLDAAAAAElFTkSuQmCC width=64 height=64>
</a>
<a href=/index.xml>
<img class=icon src=data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABoAAAAaCAYAAACpSkzOAAABOElEQVRIib2WXXWEMBBGIyESkICDroPWQSNhHRQnrANwsOsAHFAJdXD7ALSz0wmZLrTfObwwkDs/X3ISwiIgAQPHaQBegxRwORCg1cpK/lopAKN6eQEaoAduwPsBoCFoSDAEVMDZSMotF0hBT8yV7gIBtMAb8Aw8ATEDTMDHHpClDm3VGVbjbKcXtGrSQCB6YL8FreoQLfXALJC099bPg4LVbMys6DpmazdOWHbzu+29AK0KO/Wdaf2SvaNaJGKfi0ntMxfIApcGP6mEflTudd0E1KqNWrKq86OgFSYr0wbplQMfBoEwC3ZVMpG7U98C3ZZFKmwHZRcDTjn3WaCqkPWLiPfemAWKBVCzMadszAJd+W7d1YjLOek9lY2ZnneoXR5vbPy/y0mmBUfqq50rLLHj8mFoRJwWnzknvtUm1yWnAAAAAElFTkSuQmCC width=64 height=64>
</a>
</div>
<div class=subscribe>
<form action=https://api.digitalmaneuver.com/subscribe method=get>
<input class=subscribe-field style=width:200px name=email placeholder=" Subscribe to newsletter? " type=text>
<input class=subscribe-btn value=Yes! type=submit>
</form>
</div>
</div>
</div>
<div class="container has-text-centered footer-copyright">
</div>
</body>