Who goes to the mall?
I just clone someone else’s already active mac address, it works every time
What would stop you from using random, invented data?
Don’t use random, invented data. That’s wrong. Use the real data of a ceo or other executive from a company that spammed you. Or if you have the time find out who owns the mall and use their information.
info@, postmaster@, web@, abuse@, or any other mandated valid email addresses for the service that wants your data.
Any system that includes an SMTP server supporting mail relaying or delivery MUST support the reserved mailbox “postmaster” as a case-insensitive local name.
I recently did something similar. My daughter’s orthodontist practice (it’s a large office with multiple locations) from a few years ago sent a spam txt message. I tracked down the owner of the practice and called the office, “I have a new phone number. Please change it on my records.”
And gave the owner’s home number."
Walmart does similar now, though they don’t ask all that much. The bogus account I set up is…
Email: irrelevant@dispostable.com
Password: Walmart1
Name: Anonymous Human
Enjoy your anonymous free WiFi at Walmart haha!
I like noneof@yourbusiness.com, same for first/last name. Only problem is I’m not the only one so sometimes it’s already taken.
My email is whatever shit protonpass comes up with when I generate a random alias. Phone number is 3334445566 Name is: lol no Gender is undisclosed DoB is January 1st of the first year I can select. Otherwise, 1900 And income is 1.
There, free WiFi.
I usually use:
Email - nope@nah.com
Name - Nah Nope
Gender - prefer not to say
DoB - same as you
Phone - just random digits, or if I’m feeling spicy the phone number of a guy I used to be buddies with who fucked me over
Income - never been asked for this yet, probably go with something outlandish…like 1
That said…A wifi access point that requests that info is almost certainly not private for every other trackable thing you do with that wifi, however.
If it’s an open WiFi (no WPA password) packets are not encrypted anyway, so anyone on this AP can easily see everything that comes through it. A decade ago, when most websites allowed plain HTTP, there was a Firefox extension which let you hijack the Facebook or Twitter session of anyone connected to an open WiFi with a couple of clicks.
Nowadays everything is hopefully encrypted at the application level, so while attackers can see where the data goes, they can’t actually read it.