Snappy: A tool to detect rogue WiFi access points on open networks –
#Cybersec #Python
#Wifi #RogueAccessPoints
Cybersecurity researchers have released a new tool called 'Snappy' that can help detect fake or rogue WiFi access points that attempts to steal data from unsuspecting people.
Attackers can create fake access points in supermarkets, coffee shops, and malls that impersonate real ones already established at the location. This is done to trick users into connecting to the rogue access points and relay sensitive data through the attackers' devices.#Cybersec #Python
#Wifi #RogueAccessPoints
This media is not supported in your browser
VIEW IN TELEGRAM
#WiFi is part of the reason why they were able to get the poisons past the blood brain barrier…
This media is not supported in your browser
VIEW IN TELEGRAM
#WiFi is part of the reason why they were able to get the poisons past the blood brain barrier…
Forwarded from #TBOT: Take Back Our Tech
⚡️Apple & Google WiFi Surveillance Can Track Death & Destruction
@takebackourtech
Chances are, if you’ve used Google Maps or Apple Maps, you’ve contributed to one of the biggest surveillance databases in the world.
Known for their accuracy, big tech maps can locate your phone within a few meters and even indoors.
No, these big tech maps aren’t using GPS - they’re using WPS or Wi-Fi positioning system.
These WPS systems collect millions of WiFi networks and tag them with locations.
Researchers in Maryland discovered through a flaw in Apple’s WPS that they could gather at least 2B (2 Billion) WiFi location points by requesting WiFi networks at random.
That’s enough points to cover the world’s populated areas, notably China was nearly empty except for a few thousand points. Looks like even the CCP can’t opt out of this surveillance.
We did the work for them.
When you use Google or Apple maps, your phone will send the nearby WiFi networks along with their signal strength to the WPS. The WPS will look up these networks in a database that has hundreds of millions of networks along with their location. The calculation is then performed on the server for Google location’s service, and on the phone for Apple location’s service - which sent a list of 400 additional WiFi points back.
And this is how you get a precise location for your phone. Any new WiFi networks you scanned are potentially added to the WPS databases.
Apple & Google have made their users the instrument of their surveillance.
And the things you can do with this surveillance are harrowing. The researchers were able to see how many WiFi access points went offline in Gaza due to the constant bombardment that caused the deaths of 40,000 civilians.
Similarly the researchers were able to see the damage from the August 2023 Maui fires, and the emigration of people from Ukraine to escape forced conscription.
Apple, Google and any organization they choose to share this WiFi data will have incredible capabilities. Don’t worry though - because these companies care so much about privacy - they give you a way to opt out.
Solutions
Add _nomap to the end of your WiFi SSID (name), Google and Apple promise not to index Wifi networks ending with those names.
Turn off your WiFi network and use ethernet cable.
Read primary source material here.
Get the latest updates on our mailing list: Above Phone
Above Book: Learn about our privacy laptop: https://abovephone.com/book
Above Suite: Use our privacy services: https://abovephone.com/suite
#TBOT #AbovePhone #WiFi #Surveillance #Big_Tech
—
https://takebackourtech.org
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
@takebackourtech
Chances are, if you’ve used Google Maps or Apple Maps, you’ve contributed to one of the biggest surveillance databases in the world.
Known for their accuracy, big tech maps can locate your phone within a few meters and even indoors.
No, these big tech maps aren’t using GPS - they’re using WPS or Wi-Fi positioning system.
These WPS systems collect millions of WiFi networks and tag them with locations.
Researchers in Maryland discovered through a flaw in Apple’s WPS that they could gather at least 2B (2 Billion) WiFi location points by requesting WiFi networks at random.
That’s enough points to cover the world’s populated areas, notably China was nearly empty except for a few thousand points. Looks like even the CCP can’t opt out of this surveillance.
We did the work for them.
When you use Google or Apple maps, your phone will send the nearby WiFi networks along with their signal strength to the WPS. The WPS will look up these networks in a database that has hundreds of millions of networks along with their location. The calculation is then performed on the server for Google location’s service, and on the phone for Apple location’s service - which sent a list of 400 additional WiFi points back.
And this is how you get a precise location for your phone. Any new WiFi networks you scanned are potentially added to the WPS databases.
Apple & Google have made their users the instrument of their surveillance.
And the things you can do with this surveillance are harrowing. The researchers were able to see how many WiFi access points went offline in Gaza due to the constant bombardment that caused the deaths of 40,000 civilians.
Similarly the researchers were able to see the damage from the August 2023 Maui fires, and the emigration of people from Ukraine to escape forced conscription.
Apple, Google and any organization they choose to share this WiFi data will have incredible capabilities. Don’t worry though - because these companies care so much about privacy - they give you a way to opt out.
Solutions
Add _nomap to the end of your WiFi SSID (name), Google and Apple promise not to index Wifi networks ending with those names.
Turn off your WiFi network and use ethernet cable.
Read primary source material here.
Get the latest updates on our mailing list: Above Phone
Above Book: Learn about our privacy laptop: https://abovephone.com/book
Above Suite: Use our privacy services: https://abovephone.com/suite
#TBOT #AbovePhone #WiFi #Surveillance #Big_Tech
—
https://takebackourtech.org
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
Substack
Google & Apple Steal 2B+ Wifi Access Points
Chances are, if you’ve used Google Maps or Apple Maps, you’ve contributed to one of the biggest surveillance databases in the world.
New #WiFi Takeover Attack—All #Windows Users Warned To Upgrade To Linux Now
https://www.forbes.com/sites/daveywinder/2024/06/14/new-wi-fi-takeover-attack-all-windows-users-warned-to-update-now/
https://www.forbes.com/sites/daveywinder/2024/06/14/new-wi-fi-takeover-attack-all-windows-users-warned-to-update-now/
Forbes
New Wi-Fi Takeover Attack—All Windows Users Warned To Update Now
Microsoft has released a critical security update for users of all supported Windows versions as a new Wi-Fi compromise requiring no authentication has been confirmed.
Forwarded from Pegasus NSO & other spyware
Surveilling the Masses with Wi-Fi-Based Positioning Systems
Erik Rye University of Maryland
Dave Levin University of Maryland
#Wifi #Surveillance
Erik Rye University of Maryland
Dave Levin University of Maryland
Abstract—Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that
Apple’s WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID
geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world.
The privacy implications of such massive datasets become more stark when taken longitudinally, allowing the attacker to track devices’ movements. While most Wi-Fi access points do
not move for long periods of time, many devices—like compact travel routers—are specifically designed to be mobile.
We present several case studies that demonstrate the types of attacks on privacy that Apple’s WPS enables: We track devices moving in and out of war zones (specifically Ukraine and Gaza), the effects of natural disasters (specifically the fires in Maui), and the possibility of targeted individual tracking by proxy—all by remotely geolocating wireless access points..
#Wifi #Surveillance
Media is too big
VIEW IN TELEGRAM
Get rid of #WiFi, put your phone into airplane mode and hook it up to ethernet.
Original source: https://youtu.be/Q83Jnm1PO04
Original source: https://youtu.be/Q83Jnm1PO04
#XFINITY #WIFI SPIES ON YOUR HOME MOVES— #CIA CONTRACTOR #PALANTIR GAINS ACCESS VIA #COMCAST
Comcast’s Xfinity has rolled out “WiFi Motion,” a real-time in-home motion tracking system for FREE, just as its data infrastructure now connects to CIA-linked surveillance firm Palantir through a new integration with Databricks, a leading enterprise AI and data platform provider.
This comes as #DARPA launches a new military AI program—MAGICS—designed to predict human behavior at scale.
The news also comes as the #Trump admin expands Palantir’s role in a federal effort to consolidate Americans’ personal data.
Without additional cameras or sensors, the WiFi motion system uses signal disruptions between devices to track movement. Room to room, across floors, and even down to small gestures like a hand wave.
When surveillance features are "free", your data and privacy are usually the real price.
https://modernity.news/2025/07/02/xfinity-wifi-spies-on-your-home-moves-cia-contractor-palantir-gains-access-via-comcast/
@westcoast_intel
#stalking #surveillance #gov #why
Comcast’s Xfinity has rolled out “WiFi Motion,” a real-time in-home motion tracking system for FREE, just as its data infrastructure now connects to CIA-linked surveillance firm Palantir through a new integration with Databricks, a leading enterprise AI and data platform provider.
This comes as #DARPA launches a new military AI program—MAGICS—designed to predict human behavior at scale.
The news also comes as the #Trump admin expands Palantir’s role in a federal effort to consolidate Americans’ personal data.
Without additional cameras or sensors, the WiFi motion system uses signal disruptions between devices to track movement. Room to room, across floors, and even down to small gestures like a hand wave.
When surveillance features are "free", your data and privacy are usually the real price.
https://modernity.news/2025/07/02/xfinity-wifi-spies-on-your-home-moves-cia-contractor-palantir-gains-access-via-comcast/
@westcoast_intel
#stalking #surveillance #gov #why
modernity -
Xfinity WiFi Spies on Your Home Moves—CIA Contractor Palantir Gains Access via Comcast
Your home router now knows when you move—and a CIA-linked surveillance contractor may know too
Media is too big
VIEW IN TELEGRAM
⚡️WiFi Sensing Sees Through Walls
Comcast rolled out “WiFi Motion” to millions of routers. Once enabled, it tracks movement inside your home using signal strength between your router and devices.
Read full article on Substack
Xfinity admits it shares this motion data with law enforcement—no notice required.
This tech, called #WiFi sensing, has been around for over a decade. It can track movement through walls, detect gestures, and monitor activity—originally used for breath #tracking in hospitals.
Verizon and Google Nest offer similar tools. While sold as “security,” it opens the door to surveillance and #EMF exposure—linked to anxiety, fatigue, and more.
Now’s the time to go wired.
🪧 Watch this full episode
📱 Get private phones, laptops, and tablets
🔒 Webinar replay — EMR awareness w/ Geophilia
Comcast rolled out “WiFi Motion” to millions of routers. Once enabled, it tracks movement inside your home using signal strength between your router and devices.
Read full article on Substack
Xfinity admits it shares this motion data with law enforcement—no notice required.
This tech, called #WiFi sensing, has been around for over a decade. It can track movement through walls, detect gestures, and monitor activity—originally used for breath #tracking in hospitals.
Verizon and Google Nest offer similar tools. While sold as “security,” it opens the door to surveillance and #EMF exposure—linked to anxiety, fatigue, and more.
Now’s the time to go wired.
🪧 Watch this full episode
📱 Get private phones, laptops, and tablets
🔒 Webinar replay — EMR awareness w/ Geophilia
This media is not supported in your browser
VIEW IN TELEGRAM
#Wifi test on plant growth.
If you want to see a full test, you can check the link below:
👇
https://youtu.be/ee8eozHfPQ8
📱Instagram🌐Twitter 🥳Patreon
If you want to see a full test, you can check the link below:
👇
https://youtu.be/ee8eozHfPQ8
📱Instagram🌐Twitter 🥳Patreon
🤖 CVE-2025-48539: #Android #bluetooth stack access over adjacent #WiFi with no user interaction. With chains privilege escalation, the attacker can do full device access remotely.
https://osv.dev/vulnerability/ASB-A-406785684
https://osv.dev/vulnerability/ASB-A-406785684
osv.dev
OSV - Open Source Vulnerabilities
Comprehensive vulnerability database for your open source projects and dependencies.
Chasing Your Tail (CYT)
https://github.com/ArgeliusLabs/Chasing-Your-Tail-NG
A comprehensive #WiFi probe request analyzer that monitors and tracks wireless devices by analyzing their probe requests. The system integrates with #Kismet for packet capture and WiGLE API for #SSID #geolocation analysis, featuring advanced #surveillance #detection capabilities.
Features
Real-time Wi-Fi monitoring with Kismet integration
Advanced surveillance detection with persistence scoring
Automatic GPS integration - extracts coordinates from Bluetooth GPS via Kismet
GPS correlation and location clustering (100m threshold)
Spectacular KML visualization for Google Earth with professional styling and interactive content
Multi-format reporting - Markdown, HTML (with pandoc), and KML outputs
Time-window tracking (5, 10, 15, 20 minute windows)
WiGLE API integration for SSID geolocation
Multi-location tracking algorithms for detecting following behavior
Enhanced GUI interface with surveillance analysis button
Organized file structure with dedicated output directories
Comprehensive logging and analysis tools
Requirements
Python 3.6+
Kismet wireless packet capture
Wi-Fi adapter supporting monitor mode
Linux-based system
WiGLE API key (optional)
https://github.com/ArgeliusLabs/Chasing-Your-Tail-NG
A comprehensive #WiFi probe request analyzer that monitors and tracks wireless devices by analyzing their probe requests. The system integrates with #Kismet for packet capture and WiGLE API for #SSID #geolocation analysis, featuring advanced #surveillance #detection capabilities.
Features
Real-time Wi-Fi monitoring with Kismet integration
Advanced surveillance detection with persistence scoring
Automatic GPS integration - extracts coordinates from Bluetooth GPS via Kismet
GPS correlation and location clustering (100m threshold)
Spectacular KML visualization for Google Earth with professional styling and interactive content
Multi-format reporting - Markdown, HTML (with pandoc), and KML outputs
Time-window tracking (5, 10, 15, 20 minute windows)
WiGLE API integration for SSID geolocation
Multi-location tracking algorithms for detecting following behavior
Enhanced GUI interface with surveillance analysis button
Organized file structure with dedicated output directories
Comprehensive logging and analysis tools
Requirements
Python 3.6+
Kismet wireless packet capture
Wi-Fi adapter supporting monitor mode
Linux-based system
WiGLE API key (optional)
GitHub
GitHub - ArgeliusLabs/Chasing-Your-Tail-NG: MUCH Improved version of the Python Chasing Your Tail Tool to help you determine if…
MUCH Improved version of the Python Chasing Your Tail Tool to help you determine if you're being followed - ArgeliusLabs/Chasing-Your-Tail-NG