Geolocation Opt-Out Mechanisms: _nomap and _optout SSID Techniques
Limit your location with a quick and easy method to control device visibility, suitable for use at home, in the office, or while traveling.
This is nothing new, Network Proximity has been around for a long time, so if you’re coming across this and are aware—add your tomatoes to a burger or some tacos. The introduction of these opt-out mechanisms by major tech companies occurred at different times, yet a long time ago, and many people have no idea about them; surprisingly the company many people betray as stalking were actually the first to respect it (over backlash of course) and ironically the company many assume is the most private were somewhat of the last.
How to Opt Out of Router/AP, B/SSID “spying”?
It’s pretty straightforward, and takes less then 5 minutes. Take your WiFi name: “TheSmiths-5g” and literally add “_optout_nomap” to the end of it such as “TheSmiths-5g_optout_nomap”. Proceed with the finalizing update, restart and reconnect your devices, and you’re done.
Share | Xybercraft ™
What even is “_nomap” and “_optout”?
These initiatives were part of a broader trend in the early 2010s where tech companies were responding to increasing privacy concerns and regulatory scrutiny regarding location data collection.
Google (_nomap):
Introduced in November 2011
This was in response to privacy concerns raised after Google's Street View cars were found to be collecting Wi-Fi network data.
Microsoft (_optout):
Introduced in July 2013
This was part of Microsoft's location services policy update.
Apple (_nomap):
Apple followed and honored Google's _nomap suffix and recently updated their privacy policy—in the past year.
Should you Consider Adding “_nomap” and “_optout” for your Devices?
Yea, but, remember not everyone does this, so when you are out in public you aren’t invisible. But at home or work if you can, do it. Devices scanning for nearby Wi-Fi networks report SSIDs to companies, and those companies sell or trade them to other companies, and the dominoes continue, but this isn’t a way to hide, there truly no such thing, sorry your von downs mask UUIDs, or other identifiers or multicasting probs from your neighbors devices. If "_nomap" or “_optout” is detected at the end of an SSID, the network is flagged and excluded from the database it’s reporting to for advertisement reasons, it still send your device(s) information, in many, many other factors.
* Potentially additional privacy suffixes:
a) "_optout_everywhere" (Apple)
Opts out of Apple's wireless data collection
b) "_nomap_nomap" (Mozilla)
Opts out of Mozilla Location Services
c) "_noscan" (General)
Indicates that the network doesn't want to be scanned or included in any database
Complete example for those willing to bargain for a little extra “privacy” on their network could try: "_optout_nomap_noscan" at the end of their wireless name, if, however the character limit will allow it lol, I’ve seen more dramatic examples but let’s just leave it at that.
This SSID would opt out of data collection from Google, Microsoft, Apple, and indicate a general preference not to be scanned.
Important notes:
All suffixes should be in lowercase.
The order of the suffixes doesn't matter.
Some routers may have character limits for SSIDs, so using all suffixes might not always be possible.
These suffixes are respected voluntarily by companies, and their effectiveness may vary.
While these suffixes can enhance privacy, they're not a guarantee of complete privacy protection. It's always good to combine these with other security measures for your Wi-Fi network. Routers such as Starlink automatically implement certain methods with randomization for more privacy centric networking.
Recommend | Xybercraft ™
Summary
Yea it does look a little odd, and is a bit more to type but big deal, it’s worth the simple trade off.
Many individuals and organizations expressed concerns about privacy, arguing that Wi-Fi network owners should have control over whether their networks were included in these databases.
In 2010, it was revealed that Google's Street View cars not only mapped Wi-Fi networks but also collected unencrypted data from them (e.g., emails and passwords). This led to significant backlash and legal action in several countries.
The controversy highlighted the lack of transparency in how companies collected and used location data from Wi-Fi networks.
@Google, #Apple, #Microsoft, #HowTo, @JudahEstrada, @Substack
Subscribe | Xybercraft ™