search
HomeDatabaseMysql Tutorial微软MAC地址数据库惊爆安全门:任何人都可以定位你

微软一直在建设一个以位置服务为目的,能够公开播放MAC地址(同时包括所在街道)的数据库。这可能包括手机以及笔记本电脑在内。问题在于,微软并没有保护好这个数据库的安全。 根据来自Cnet的Declan McCullagh的一篇报道称,随着汽车到处走寻找热点区域,微

微软MAC地址数据库惊爆安全门:任何人都可以定位你

微软一直在建设一个以位置服务为目的,能够公开播放MAC地址(同时包括所在街道)的数据库。这可能包括手机以及笔记本电脑在内。问题在于,微软并没有保护好这个数据库的安全。

根据来自Cnet的Declan McCullagh的一篇报道称,随着汽车到处走寻找热点区域,微软收集了连接到wi-fi 的Windows 7手机数据,并记录在数据库里,但是因为他们疏于保护该数据库,任何人都可以访问该数据库。Cnet在不同的MAC地址登陆到数据库上都得到了非常详细明确的地址返回。

它工作的原理是这样的:作为一个接入点的时候,iPhone和Android卓设备会自动改变其Wi-Fi 的MAC地址。Android设备选择的MAC地址是以02:1A开头的。

Google的数据库中不包括02:1A:11:F2:12:FF的MAC地址,不过微软的数据库有,并且报告称其位于华盛顿特区,在新罕布什尔州大道的黑山大使馆。

这就很不妙了。如果微软已经记录你网络的MAC地址(包括你的位置),则任何拥有该MAC地址的人都可以通过微软的数据库运行,从而有可能找到你居住的地方。这是很不好的。此外,微软还未说明他们是否收集了连接到网络的设备的数据。如果他们记录了你的笔记本电脑或者手机的MAC地址,那么拥有该信息的人都可以通过微软的地图查找到你的位置。这样就真的很糟糕了。

关于这个问题,Cnet也得到了来自微软Windows Phone工程组的编程主管Reid Kuhn的一份正式声明:

“为了提供位置服务,微软通过用户的设备和有管理的操纵,收集了公开播送的手机发射塔ID以及Wi-Fi接入口的MAC地址。如果一个用户选择智能机或者移动设备作为Wi-Fi接入口,他们的MAC地址也可能会被我们纳入服务的一部分。然而,由于移动设备通常从一个地方移动到另外一个,他们对于提供位置并没有什么作用。一旦我们认定一个设备没有固定在一个位置的时候,我们将把它从我们动态的MAC地址列表中删除。”

令人不安的是,对于那些不希望自己的MAC地址被包括进去的人而言,似乎没有任何选择将其剔除出来的能力。如果你担心自己的信息是否被存储于这个数据库,你可以输入在这个由斯坦福的研究人员Elie Bursztein开发的网站上找到的你的设备的MAC地址(如果你不知道自己的MAC地址,Cnet建议使用这个网站查找出来)。由于你并无法删除你的信息,也许你可以骂骂微软。

雷锋网

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment