Does randomizing MAC address further defend de-anonymizing? Suppose there’s a Firefox bug that allows JavaScript to read MAC address (and further, router MAC like in ip n
), all your web browsing is then linked.
Maybe it’s not practical to do this on the hypervisor level, how about VM MAC spoofing? Is it a good idea to change Gateway and Workstation MAC address at times?
MAC address is mentioned here:
MAC randomization might make sense on the host. See:
As for MAC address inside VMs…
Using Multiple Whonix-Workstation ™ is generally recommended.
If such a bug allows to read the MAC address of the VM, what other things should be presumed readable from remote (such as Firefox when having a bug)? I am asking, because then the following would apply:
See also:
1 Like