Posts

Fix MAC Address Randomization

Image
  Visit   Device Fingerprint   &   MAC Randomization   for more details  or Medium Recent changes at Network and OS level by vendors like Apple, Google and Microsoft, are marking a trend of masking customer’s visibility on the network transport as much as possible — far more rigorously than in today’s state. These changes, which will be covered below, are marketed as means to create end-to-end user privacy, eliminating surveillance and censorship from threat actors on said transport. De-facto, with the clear ad v antages of this important trend, comes a critical damage to ISP’s ability to supply security services for user networks and devices — as they rely on information extracted from data in transit. In this paper, we will cover the three main upcoming changes that are soon to be standardized, and describe SAM’s strategy to overcome the challenges they bring, for us to continue providing our cutting edge technology from day-one of their deployment. T...

Solving MAC Address Randomization

  Visit   Device Fingerprint   &   MAC Randomization   for more details or Medium Post about  MAC Randomization As a consumer of security solutions, the successful protection of my valuable assets relies on many ‘links’ in the chain that is my security services stack. From Firewall to EDR — each component hooks on a different technology, and is responsible for narrowing the attack surface in it’s specific field of operation. A CISO’s Intelligent composition of this stack creates a synergistic protection against all aspects of a cyber attack relevant to their network infrastructure. But what if this   stack was self-devouring?  Today we are observing a process in which big players in this chain who also design the end-user’s OS, are harnessing their technology to create a vendor-lock at the expense of other security solutions in the war for security revenues. In this article we will examine a single case study in this affair — of an impending b...