instruction
stringlengths
24
29.9k
I've put my wireless card in monitor mode following this tutorial. After that, I started monitor my wifi home and, after a few seconds, I stop it. Every packet was crypted (obviously), so I follow this tutorial and including my <wifi_password>:<SSID>, but nothing happens. Every packet is still crypted. Any idea/help/so...
I want to clear my doubt that Is there any issues coming from adding 'Strict-Transport-Security' and 'X-XSS-Protection' headers ? Header set Strict-Transport-Security "max-age=10886400; Header set X-XSS-Protection "1; mode=block" I didn't put 'include SubDomains' for the HSTS header because I wasn't sure if we always ...
I clicked on a link that appeared to be perfectly legit. It proceeded to bring me to a suspicious website that downloaded a file to my PC automatically. I deleted the file quickly and never ran it. I can't exactly remember the file name, but it was something like "1...sco" (may have been a different file extension). Ho...
I work at a clinic where we need to pseudonymize patient data. I wrote a small app for this using R (RStudio). R will be installed on computers with access to internet but my idea is to use R offline, i.e. fully blocking it with a firewall in order to prevent hacks on our pseudonymization app. But before anything gets ...
$ openssl ecparam -in param-ec.pem -text -noout ASN1 OID: secp384r1 NIST CURVE: P-384 The file param-ec.pem indicates the curve is P-384, also known as secp384r1. In the same way: secp521r1 = P-521 and secp256k1 = P-256 prime256v1 = P-256 (thank you for the correction, @dave_thompson_085) Question: Why? Where d...
I get a phishing messages on SMS every now and then. I'm not sure if it's from anyone that knows me. What information can I get about the sender of the SMS?
I have written and was planning on publishing a blog post about scams. The blog post talks about methods used by hackers in their Reconnaissance phase (specifically, researching individual people) and some potential social engineering methods that phone scammers could use to potentially increase their number of success...
I have seen that for RSA2K the hash function SHA-256 has been used. Now my question is if I want to use RSA3K, should I change the size of the hash function for example from SHA-256 to SHA-384? Is there a relationship that one needs to consider between RSA key size and has function size? Are these parameters defined in...
I am studying the MITRE ATT&CK framework and I am confused with the following tactics: Reconnaissance, Discovery, and Resource Development. What are the differences between these 3 tactics? According to the study material: Reconnaissance is the adversary trying to gather information they can use to plan future operati...
I'm currently performing a full system scan with clamscan and found the following message: /usr/lib/pinta/Clipper.dll: Win.Trojan.Clipper-9942182-0 FOUND I went online and couldn't find any reference to this type of detection, so I'm starting to believe this is an actual virus and not some random false positive. Can a...
I'm learning about linux hardening and I'm creating a sudoers file. My idea is to separate things. There will be a user to see log files, another that can sudo to manage system processes, another for network managements, and so on and so forth. Is this overkill and safe or just overkill? I'm using groups to do so, like...
We are told that the roots of trust in the PKI are the handful of Certificate Authorities that issue root certificates and sign other certificates and ensure at least some extent of trust to be maintained on the internet. These root certificates come pre-installed on most modern operating systems. This provokes the tho...
Today i faced a web site related to government that showed me all of my certificates in a combobox for authentication on that web site. What were those certificates? How can i show them in a asp.net web site? Can browser access to those certificates? If yes, Why there is such that access? Can some body steal them and u...
I wonder, is possible XXE attack in this case? The data of request is starting with: <InteractionMessage><Header><SenderApplication>VIP3.0</SenderApplication><ReceiverApplication/><TransactionID>1651397670193</TransactionID><Timestamp>2022-05-01T02:34:30.193-07:00</Timestamp></Header><Body><********><Attachments xmlns:...
I have an anchor that has href attribute populated by my input. I am trying to input javascript, but it always renders it useless since it always appears between double quotes. So far, I have tried many inputs including: javascript:alert(1) "javascript:alert(1) """javascript:alert(1) " onclick=alert(1) But, everytime ...
Suppose you have a target machine (desktop, smartphone, server) and that you have any needed knowledge about the target machine to perform the following task. Is it possible to infect given machine using that information, without needing the user to install something themselves (aka social engineering/phishing/trojan)?...
I have been operating websites that use client certificates to authenticate the users. To my understanding, you need to make your own CA. First of all, that way an attacker will have huge troubles to even present a suitable certificate, meaning the website is - by default - completely inaccessible to anyone but the use...
I just noticed in my access.log several POST requests coming from a (hidden) registration sub page that is not accessible via any link. A 'hacker' seems to have posted a form from there (manually it seems), using a random email as input. I received an email notification that I had setup when this happened and started i...
I have started an unprivileged docker container and trying to start the privileged exec session. It has CAP_SYS_MODULE capabilities, but still, I am getting operations not permitted in insmod. docker start -it -d --name test ubuntu docker exec -it --privileged test sh ... / # insmod shell.ko insmod: ERROR: could not in...
I'm a high schooler in a CyberDefense Class and we are learning to PenTest. I'm on Red Team and my teacher set up a system with Rasbian as the OS. When I run a scan on the computer scanning the Top 20 ports with nmap. It all comes up with filtered, including the Windows ports. And when I run a scan, doing a nmap -v -...
I have some related questions: Is it possible to spoof the source address in the TCP/IP header when using HTTPS? If possible, is there any way to detect source address change? I think the checksum is not a good idea because if you can change the source address it will be the same with the checksum. Is the hostname uni...
I use Vivaldi. I have previously filled in forms where I used a certain name and e-mail. Today I cleared the browser data except for the autofill stuff. Then I went to Stack Exchange to register an account. It's pre-populated with an e-mail address and even password filled in because of the autofill feature. This makes...
In order to decrypt HTTPS you need the public key and the private key. How can a hacker acquire the private key? What exactly does he have to do to get it? I read that they use packet sniffers like Wireshark to decrypt HTTPS, is this true? I also read somewhere that the hacker needs to have physical access of your devi...
When using OpenVPN, tls-auth and tls-crypt are widely adopted options, allowing a static key to be used in the initial handshake. This helps prevent against DoS attacks, as without the valid key a client will be disregarded almost instantly. This makes sense for personal VPNs, however when it comes to commercial VPNs i...
I am currently doing a project on FTP bounce and after reading up, I still do not really get how it works/can work. Appreciate if I can receive enlightenment from the experts here. I understand that the FTP bounce vulnerability allows an attacker to send commands to an FTP server through another intermediate server tha...
From our office LAN, Secure FTP connections fail. But with a VPN client connection, there is no problem. What could be the cause of this problem, what do we have to change on our firewall? I normally use another client but for comparison, I use FileZilla here. This is the connection log without VPN: Status: Resolving a...
I read that phones encrypt communication (GSM as implemented in 2G,3G..) - particularly voice as SMS are unencrypted - using a stream cipher. Symmetric Stream ciphers use the flip-flop machinery to start (a true random generator imho), and then they follow some algorithm to change message bitwise ( and can be broken wi...
Taking the concept from the Gemini protocol that allows clients to identify themselves using their own self-signed certificate - is this a valid concept that could be used in other protocols and what is the downside? From a client's point of view, when you come across a login prompt, you could select your certificate (...
I am attempting to scrape a site which is notoriously difficult to scrape. Access from datacentres is generally blocked. In the past I've used various proxies, but recently these have stopped working. The site employs various pitfalls when it doesn't like the user; e.g. certain javascript components fail, or the serv...
As far as I know, JWT tokens are used for implementing 'stateless server'. But as I try to apply Jwt to my website that uses sessions and cookies for authentication, I found that most people store refresh tokens in their db and compare them to tokens from the clients. If so, isn't that kind of ironic? Because I thought...
I re-populate form with JSON data via javascript (all data has the same origin server) 1 Wen the page load, make a request post ajax 2 The response Ajax is a: Object { primary_ns: {…}, secondary_ns: {…} } Here is where I do the re-populate form, looping over Object (using DOMPurify) Does this process have some securit...
I am a bit late to the party but I decided to look into the polkit vulnerability (CVE-2021-4034). I get that the code injection comes from iconv loading an arbitrary library file through the GCONV_PATH environment variable. However I can't get my head around why it works since this variable is checked in __gconv_load_c...
I am learning about Buffer Overflows (BOF) and came up with this piece of C code: #include <stdio.h> #include <stdlib.h> void win() { system("/bin/bash"); } int main() { char s[128]; scanf("%s",&s); printf("%s\n", s); return 0; } Using pwntools I wrote the following script: fr...
My Wordpress site is experiancing high load because of large numbers of GET request like: /?s=1ce83ab566d6797d400bd3d03bb45946 How to prevent this? 17.121.115.141 - [04/May/2022:10:14:35 +0200] "GET /?s=1ce83ab566d6797d400bd3d03bb45946 HTTP/1.1" 301 162 - "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/6...
If I own a software and I want to conduct a pen test with pen testers, should I define the scope or do the pen testers assess the software first and they define the scope? How does scope definition happen? Furthermore, does the term "full scope" exist? By "full scope", I mean pen testing the whole software without defi...
I wonder what Session Fixation exploit possibilities still exist today in case the website does not change the Session-ID in a cookie after login other than the following: XSS MiTM open redirect vuln We've encountered a customer website which has the issue and would like to design a PoC to exploit it.
Looking to create a form where developers can submit requests for packages to be installed. We want to create a list of questions that can help us determine whether or not a package is safe. What are some important questions to include in the form for our developers? My list so far: Package Type: NPM, PYPI, etc... Pa...
I was reading into the basics of SQL injection attacks on w3schools here. In the second example, I was curious as to why the equal sign was used. I have quoted within the line below. " or ""=" Is there any particular reason why an equals sign was used, or is it a placeholder for any character or symbol? Included belo...
When an email recipient server (say server-A) is configured to forward to another email addresses (on say server-B), is TLS applied all the way up to server-B, or does it end at server-A, or something else? Below I'm sharing my rather concrete example to help giving more context for my question, but this is only an exa...
What top-level domains (TLD) are safe and would be safe for example to whitelist? I guess .gov and .mil are safe? While .com, .net and .org are not since anyone can register those. Is .int safe? And is this TLD actually used? I know there were some .edu domains registered before the sharpened rules introduced in 2001. ...
In his talk "Keynote address: securing the individual" at authenticate2020 (around 23:44), Whit Diffie asks "ever wonder why an app can come on and grab your whole screen? There's a whole set of standards to resist that. They were called 'secure workstations' when the military got interested in it, but it isn't much a...
Someone is trying to change my passwords to take over my Gmail account and PayPal accounts. I have two factor log in, so I know this is happening daily. I know because I keep getting my passcode verification text two or three times a day from google and PayPal to change my password. How do I find out who this is?
I found a curious website that shows listings. It allows you to type a description, and also allows for you to use tags like <b> and <u> for formatting. But it doesn't let you do more interesting things like <a> and <li>. From this, I think it's a custom HTML sanitiser, not the typical htmlentities(). I was curious as ...
I have come up with the following approach to remember master passwords (to use in software like KeePass, etc): Since it is annoying to type the master password every time we power up the PC, we store a text file that contains an unanswered, personal question. The master password is obtained by answering the question, ...
After starting arachni on VPS, I'm trying to connect with web UI. But browser cannot establish connection with ERR_CONNECTION_REFUSED. Some console output: arachni Puma starting in single mode... * Puma version: 5.6.4 (ruby 2.7.5-p203) ("Birdie's Version") * Min threads: 0 * Max threads: 5 * Environment: development...
If there are 3 machines A, B and C and A communicate directly with B (A -> B) but B is executing port fordwarding with the next command socat TCP4-LISTEN:443,fork TCP4:<ip machine C>:443 So in fact the communication is A -> B -> C. Is there any way that A could know it is really communicating with C?
When a crash occurs or when a user reports a bug, I'd like to send my application's logs to a cloud service (Firebase). But I've just realised that there are tons of kindergarten level exploits. For example: they can make these logs tremendous sized, causing me huge bills. Some examples: If the log are accessible/...
I am reading "Serious cryptography" and he wrote the following: Informational security is based not on how hard it is to break a cipher, but whether it’s conceivable to break it at all. A cipher is informationally secure only if, even given unlimited computation time and memory, it cannot be broken. Even if a successf...
The government can find servers very quickly by contacting the hoster that hosts your VPN server, and the service provider might give your IP address. But what if I use torsocks ssh -d? I don't know if it's like that, but whonix gateway + port forward.
I am trying to export public and private key of an ECDSA certificate from Windows key store. PFXExportCertStoreEx fails when I try to export ECDSA certificate. GetLastError() returns 0x80090016. I am able to correctly export cert and key for a RSA certificate from Windows key store using the same API. Is the API usage ...
Alternatively, the question could be asked: Does issuing a checksum for a file we sign anyways just duplicate work? Use case: Firmware sent to an IoT device. We sign it, and form a separate checksum for it. My understanding is that this is unnecessary, since the signing process guarantees data integrity and data authen...
I'm trying to stop a server using Diffie Hellman key exchanges of less than 2048 bits, but I'm getting confusing results. I've run Get-TlsCipherSuite | Format-Table Name, Exchange, Cipher, Hash, Certificate and I can see TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_...
Comparing common smartphones running updated versions of Android or iOS to common desktop/laptops running updated versions of Windows or Linux: Are smartphones inherently less secure? I get the impression that prime targets like politicians, journalists or business people are getting their phones hacked more often than...
I know all baseline steps to do DNS enumeration over a domain. But my questions is: how can I enumerate a server when I do not know which domain it is managing and I only have its IP address? My scenario: I discovered 2 DNS servers running in a scope during an enumeration exercise. These hosts were not supposed to be t...
I know there are multiple libraries for managing authentication, but I have a hobby project and wanted to create a very simple authentication system. It'd set a cookie in the client's browser with a random id and then check against it in the database to get the user information. I thought of using crypto.getRandomValue...
What security is gained from this procedure? What does this procedure accomplish? Many professionals do this, like government officials and lawyers. First, they email me the attachment (e.g. PDF, Word file, Excel spreadsheet). And they write "Please see the password in the separate subsequent email." They email me a 2n...
OpenVPN throws a "signature digest algorithm too weak" error when I try to connect to a specific VPN. A common suggestion for a workaround is using the following config: tls-cipher "DEFAULT:@SECLEVEL=0" This works, but I was unable to find any documentation about what SECLEVEL does. Does it just allow the less-secure ...
Backing up your password manager is a good idea in case your house burns down, but where do you store the password to the off-site backup? Remembering the master password is easy, but re-using the master password directly for my off-site backup is a bad idea. But what if I used a key derivation function to generate a p...
I'll start by saying I'm not sure which stack community I'd ask my question, but I'm looking into using ACLs to manage file access on our server because of specific IT security requirements. We mostly get by using regular Linux user/group ownership permissions since there are clear group/roles. We would like to start w...
Update: I've been able to work out everything I was asking about packet structure when I was finally able to get Wireshark to work, but there is one last thing I'm confused on which I detail at the end of the question. Original question: I'm new to networking and have been reading into how OpenVPN constructs its packet...
I’m imagining a system similar to UAC on Windows but implemented at the router level for IP addresses instead. (Or AS numbers, BGP numbers, Port number, etc…) Naturally this makes router setup slightly more complicated because at least one admin user, or device, will have to be specified and makes usage more of a hassl...
Unquoted service paths might be used as a privilege escalation vector after an attacker gains access to a Windows host. Given Hector's answer in the following question: "Windows Unquoted Search" Fix? I understand some software may break down if Microsoft disables it. But is there any option for Windows users to disable...
The OAuth 2.0 specification states: The authorization server MUST support the use of the HTTP "GET" method [RFC2616] for the authorization endpoint and MAY support the use of the "POST" method as well. If the authorization server supports the POST method to the authorization endpoint, does it need to: Accept paramet...
Why do some people say that using Tor within my normal operating system will not be safe? What differentiates Windows and Tails in this regard? I believe that running Windows together with a VM, VPN and Tor is safe. If that is not the case, what makes Tails superior?
I'm curious how, in onion routing, the relay nodes identify which node to forward the message to? From my understanding the message must travel a specific path based on the keys the user has. I don't understand how the nodes understand how to relay the message both in the request path and in the response path. Explanat...
I have multiple computers which I am planning to use. They all run a custom-made client that starts hashcat with different args. I am able to submit the current progress, candidates etc (everything in console output) to the server, but I am unsure how I would format the arguments for the client. Example: PC 1 starts a...
Can a keylogger in a host machine capture keystrokes in virtual OS? I'd like to get into cryptocurrencies but I don't know if my machine (mac) is secure. So I thought I could create a VM for it but I guess its pointless if the host machine is compromised. Anyone knows what I should do
I am applying for a job that involves creating unit tests and end to end tests for a website. Right now, i am assigned with a task, in order to test my skills. However, my country has blocked access to that website (betting website). Is there a way to create my scripts, but pass them through a proxy or the tor network?...
I watched a Computerphile video. In the end, Dr. Bagley talked about the fact that a router can only receive/send a packet at a time, so if one device is slow it will slow every device down because all devices talk sequentially to the router. He also mentioned that around 15 slow devices are enough to drag the WiFi dow...
My goal is to create a 100% clean environment where I can interact with cryptocurrencies. For that, I can partition my disk or I can create a volume. Which one should I prefer? Some context about the options: https://old.reddit.com/r/MacOS/comments/90mr0u/partition_for_beta_testing/ I decided to try the APFS volume (n...
So I'm installing macOS to my external hard drive partition, so I can have a 100% clean environment where I can engage with cryptocurrencies. (Exchanges, stable coins, protocols, putting actual money into various stuff) Google says if I encrypt the disk partition, it won't boot up. (Rest of the disk is encrypted) Which...
For my job I use some industry-specific software that stores sensitive information. The software has a web interface with a public login page. One time I attempted to log in, but mistyped the last few characters of my password. To my surprise it let me in anyway. This started me down the rabbit hole of how the password...
I am creating a small login system. It looks like the standard username/pwd and user can either log or register. If they pass (authenticate), I create a session cookie that will be sent with the header every time, so that the user is not logging in every-time. But I am pondering this scenario. The cookie is sent in the...
I am new to Kali Linux. I am trying to generate a wordlist of 6- whatever character words where: the first part is an English word that starts with a capital letter the last 5 characters are 8765. It ends in a period I've been trying for the last hour to make it work properly in crunch going through the man pages and...
How can I change the value of src parameter inside the iFrame tag with programs like wfuzz or fuff? For example I have an iFrame on the server like this: iframe.php <html> <head><title>attack to iFrame</title></head> <body> <h1> iFrame Attack !!! </h1> <iframe src="test.php" width="72%"></iframe> </body> </html> a...
I'm attending a offensive security courses and one of the subject is import a exploit from exploitdb into msfconsole. Commonly advice that it's required to create a exploit folder inside .msf4 and later put the exploit inside this folder; later you write the comand sudo updatedb. I did this, and the exploit did not sho...
I want to migrate from Windows to Ubuntu. I understand that Ubuntu's1 security model is a bit different than that of Windows but I don't aim to ask about this particular OS, rather, in general, what should I do to protect a Free and Open Source (FOSS) AND gratis operating system after I just install it. 1. and other *n...
I am writing a small app. It creates a session once the user authenticates. I am aware of this definition of fixation attack from owasp. Attacker uses the app In this App, once they log out the sessionID is destroyed. If they are still logged in, and fix this sessionID to another user, they would redirect the user to t...
I have been reading about XD/NX bit used in Memory Pages for security. I understand it is a security feature that can help reduce system exposure to viruses and malicious code. If enabled, processor prevents the execution of code in data-only memory pages. However, I want to now understand: What does it not help to pr...
fibre to the property is being installed in my road for the first time my landlord doesn't want lots of holes in their building they acknowledges that FttP is probably necessary going forward So their solution is to have 1 package/contract installed in the lobby and then use a Mesh network to get it to the 4 flats. M...
On 2022-04-19, Neil Madden published a vulnerability in the ECDSA signature verification code of the library bundled with some editions of Java, including some recent by Oracle and in OpenJDK. That became CVE-2022-21449 (I've yet to understand if CVE-2022-21476, which goes back to Java 7, is related). In a nutshell, ac...
I'm confused a bit between the terms. What I know is that there is SAST and DAST. SAST is scanning code statically for possible vulnerabilities, equivalent to static code analysis. This is usually done with automated tools. And there is DAST (dynamic application security testing). Mainly this is pen testing. However th...
I am trying to redirecto to other machine by filtering the user agent in a apache web server. I have a web server in the machine with the ip 192.168.2.11, but this web server only should send the page to the requests WITHOUT this user agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:99.0) Gecko/20 Instead it should re...
While trying to implement NGinx WAF with ModSecurity 3.0.6 I am facing the issue with very poor XML SOAP POST performance. Rrequests takes ~5 seconds with occasional spikes up to 10 seconds. If I disable the following set of ModSecurity CoreRuleset rules, then page response is within 0.6-0.8 seconds: 942360 932150 9321...
I'm attempting to make a site with an example of what XSS would look like, so in this I take user input and set a paragraph element's innerHTML to the user input but the script isn't running. However the script tag is present within the span. Anyone know why? input in text box: <script>alert()</script> code: <!doctype ...
Let's say I have a web server exposed on Internet that deals with confidential data and it has high requirements in terms of integrity and availability. What are the risks to perform a penetration test in a production environment and what precautions I would take into consideration in technical and organisational terms...
A user is trying to access a poorly maintained website using a modern OS (Windows 10) and web browser (Firefox 100.0). They want to download something from there, but they are seeing a security warning indicating that the host is using a deprecated TLS protocol version and/or has an issue with its certificate. The user...
As the title implies, I would like to design a secure file storage/sharing platform. This is an abstract design question, so details regarding programing languages or platforms are not particularly relevant, unless they represent the only option for a good design. So, the application has to simultaneously fulfil all of...
I found a pattern password generation that works like that: sha1("very long static prefix text blablabla "+password+" very long static suffix text"); I tried hashcat combined attack or rules, but the size rule limit and only two wordlist combined stopped me. What's the best approach to crack it?
First I am very bad in cryptographic algorithms. I found online that Argon2 is more secure than SHA-512, so I used it for password hashing. There're recommended options for Argon2: Memory: 4Gb Iterations: 4 or more On my ancient server it takes a little less than infinity for 100 users... So, I've decreased options t...
EAP-TLS with TLS 1.3 is standardized in RFC 9190. Section 2.1.1 specifies Authentication. The RFC states that PSK authentication shall not be used except for resumption. This is surprising, because TLS 1.3 allows authentication with PSK (and optionally key agreement with ECDHE). Is there a fundamental reason why PSK au...
I want to connect a known to be compromised Windows machine to the network for file sharing, it has lots of pirated software installed therefor not secure. Can it be isolated so that nothing can propagate on the network and compromise other (linux) machines or do other things on the network? I only want to share images...
I want to capture HTTPS traffic, save it, and validate it at a later time. I want to ensure that at a later time I'm able to validate the HTTPS traffic using the certificate which was presented at the handshake. Any ideas how to do that? I can use openssl to get the certificate and the corresponding chain. I can use cu...
I was watching some videos of Jim Browning on Youtube and I have noticed that he reverses the connection of the scammer and gets remote access to their devices. So I was wondering about the risks that one innocent person like me could run into by connecting to a google Meeting. Is it possible that someone gets remote a...
Context I cannot remember the source, but it was most likely within the comments box for a clip about cyberattacks happening after the Russian invasion of Ukraine. It was something along the lines: comment: party X moved its hackers closer to the target Y reply: cyber attacks do not work as the normal attacks do, it d...
I noticed the command analyze under Database Backend Commands in msfconsole while trying to analyze a subnet. analyze -h shows usage as such: analyze [OPTIONS] [addr1 addr2 ..] and that's it. I have searched through rapid7's documentation as well as Offensive Security's Metasploit Unleashed for what those options act...
If we have a file that needs to change on a device that is monitoring with a tool like Qualys File Integrity monitoring. Either on Windows or using auditd on linux, how do we temporarily put some sort of "force field" around files or in some other way convince FIM that the changes were legitimate? Patching and routine...
What are some attacks I can try against this form of authentication? How do I test if they are cryptographically secure as well?
If the encrypted file is from one of the known formats, such as doc, jpg, mp3, etc., is it possible to reverse engineer it and decrypt it? I "roughly" know the mechanic behind the AES encryption: Matrix operation, Row shifting, Column shuffling, all that stuff. That's what makes AES "unbreakable", but that all seems bu...
I am using a VPN (NordVPN). I am seeing the VPN IP in browsers - this is ok. However when I check the Maps apps on my mac, it shows my true location. How can I ensure that my true location is hidden through all applications on my mac? I am using a Macbook Air 2020. I know that mac laptops do no have a gps chip and are ...