The Weight of Technology – 740 page – Now available in Kindle & Paperback

MAC Addresses: The Quiet ID Tag That Follows Your Devices Everywhere

Expanded definition of MAC Addresses from Page 119 – The Weight of Technology


If you’ve spent any time thinking about online privacy, you’ve probably heard of IP addresses. They feel obvious: numbers that represent you on the internet.

But there’s another identifier most people never see, never configure, and rarely think about—an identifier that quietly sits below your IP address and tags along with your device almost everywhere it connects:

The MAC address.

This article walks through what a MAC address actually is, how it works at the hardware level, why it exists, where it’s useful, and where it becomes a privacy and security liability. We’ll also look at modern protections like MAC randomization and what you can realistically do about it.


1. What Is a MAC Address, Really?

MAC stands for Media Access Control. A MAC address is:

A hardware-level identifier assigned to a network interface (Wi-Fi card, Ethernet port, Bluetooth adapter, etc.) so that devices on the local network can uniquely talk to each other.

A few key facts:

  • Most MAC addresses are 48 bits long, usually written as six pairs of hexadecimal numbers:
    • Example: D4:6A:6A:1B:2C:3D or d4-6a-6a-1b-2c-3d
  • The first half is typically the Organizationally Unique Identifier (OUI), which identifies the manufacturer of the network card.
  • The second half is supposed to be unique for that manufacturer, like a serial number for that specific interface.

A MAC address doesn’t care about geography, country, or ISP. It’s not “your home” or “your city.” It’s literally the ID badge on your device’s network card.

MAC vs IP: Two Different Layers

If your device is a person trying to send a letter:

  • IP address = the mailing address (where on the network the device is).
  • MAC address = the name tag on the person handing the letter to the mailroom.

The IP address helps route data across the world.
The MAC address helps deliver data inside the local network (your home Wi-Fi, office network, coffee shop hotspot).


2. How a MAC Address Works Under the Hood

To see why MAC addresses matter, you need a quick tour of what happens when your device talks to anything.

2.1. The OSI Layer Context (Light Version)

In networking models, we talk about “layers.” You don’t need all of them here, but these matter:

  • Layer 2 (Data Link) – Deals with MAC addresses and frames.
  • Layer 3 (Network) – Deals with IP addresses and packets.

Think of it as:

  • IP packets say: “This is going from 192.168.1.10 to 203.0.113.5.”
  • MAC frames say: “On this specific local network, send this to the device with MAC D4:6A:6A:1B:2C:3D.”

Your data is wrapped like this (simplified):

  1. Your app sends data.
  2. The OS wraps it in an IP packet with source/destination IPs.
  3. The network card wraps that inside an Ethernet or Wi-Fi frame with source/destination MAC addresses.
  4. That frame moves across your local network to the right device (router, switch, access point).

2.2. Switches, ARP, and MAC Tables

On a wired or Wi-Fi network:

  • Switches learn which MAC addresses live on which physical port by watching traffic.
    • They build a MAC address table: “MAC X is reachable via port 3.”
    • Future frames destined for MAC X are sent efficiently only out the right port.

To map IP addresses to MAC addresses, networks use a protocol called ARP (Address Resolution Protocol):

  1. Your device wants to talk to 192.168.1.1.
  2. It broadcasts: “Who has IP 192.168.1.1? Tell me your MAC address.”
  3. The device with that IP replies: “That’s me. My MAC is AA:BB:CC:DD:EE:FF.”
  4. Your device caches that IP→MAC mapping in its ARP table and uses it for future frames.

This ARP dance is how IP (layer 3) finds MAC (layer 2) so that traffic can actually move.

2.3. Wi-Fi and MAC Addresses

For Wi-Fi:

  • Every Wi-Fi access point and device has a MAC address.
  • When your phone scans for networks, it sends probe requests from some MAC address.
  • When you connect, your phone’s MAC is part of the association and used to track your device on that network.

This is where privacy issues start to appear: your Wi-Fi MAC address is both persistent and visible to nearby equipment.


3. Legitimate Uses and Advantages of MAC Addresses

From a network-design perspective, MAC addresses are not evil. They solve real problems.

3.1. Local Delivery and Efficiency

Without MAC addresses:

  • Every device would have to shout blindly.
  • Switches couldn’t create efficient forwarding paths.
  • Everything would either be broadcast chaos or require a much more complex system.

MAC addresses let switches build fast, hardware-accelerated lookup tables. That makes local networks:

  • Faster
  • More scalable
  • Less chatty than pure broadcast designs

3.2. Plug-and-Play Networking

MAC addresses are one reason you can:

  • Plug a laptop into Ethernet, or connect to Wi-Fi…
  • …and it just works without manually assigning hardware IDs.

The NIC manufacturer guarantees unique MACs (at least in theory), so the rest of the system can rely on uniqueness.

3.3. Network Management and Diagnostics

Administrators use MAC addresses for:

  • Device inventory: Knowing which physical device is which.
  • DHCP reservations: “Give this MAC address the same IP every time.”
  • Troubleshooting: When logs say “Device with MAC X is flapping on port 5,” that’s actionable at the physical level.
  • Segmentation policies: Some networks group traffic based on known devices, sometimes using the MAC as one element.

3.4. Access Control (With Caveats)

Some networks use MAC addresses for:

  • MAC filtering: “Only devices with these MACs can connect.”
  • Guest/Wired port control: Restricting which devices can use specific Ethernet jacks.
  • Captive portals: Tying your login or acceptance of terms to your MAC until you disconnect.

We’ll talk about why this is not as secure as it sounds in the risks section—but as a basic control, it’s still widely used.


4. Where MAC Addresses Show Up in Real Life

Even if you’ve never looked at one, your MAC address is busy.

4.1. At Home

Your:

  • Router sees every device’s MAC address on your network.
  • ISP modem/router often logs MAC addresses of devices behind it.
  • Smart TV, security cameras, IoT gadgets all broadcast their MACs when they talk.

If you log into your router’s admin page, the “connected devices” list is usually based on MAC addresses.

4.2. At Work or School

Enterprise networks track:

  • Which MAC is on which port
  • Which VLAN/subnet a device belongs to
  • Authentication status (often via 802.1X, where MAC is one of many identifiers)

IT can often map a MAC address to:

  • A physical machine
  • A specific user (via login associations)
  • A location (which switch and port; which access point)

4.3. Public Wi-Fi and Retail Environments

In public spaces:

  • Wi-Fi access points see MAC addresses of all devices that scan or connect.
  • Some retail analytics systems use anonymous device counts (based on MACs) to measure foot traffic, dwell time, and repeat visits.
  • Even without you connecting, probe requests from your phone can reveal a MAC and sometimes known network names.

Modern OSes try to randomize MACs in this scenario—but it’s imperfect in practice (we’ll cover that).


5. The Risks and Downsides of MAC Addresses

MAC addresses were designed for functionality, not privacy. That design assumption is now biting us.

5.1. Tracking and Surveillance

A MAC address is:

  • Unique per interface (usually).
  • Locally visible to any equipment you’re connected to (and sometimes within radio range for Wi-Fi).
  • Often stable over long periods of time.

That makes it a useful tracking token:

  • A shopping mall or store could see your device appear on their Wi-Fi network or in their probe logs repeatedly over days or weeks.
  • Even if they don’t know your name, they can see:
    • How often you visit
    • How long you stay
    • Which zones of the building you pass through

Now combine that with:

  • Loyalty app logins
  • Captive portal sign-ins using email or phone
  • Purchases on in-store Wi-Fi

…and that persistent MAC can become linked to your real-world identity.

5.2. Device Fingerprinting Beyond Cookies

Even if you clear your browser cookies or use a VPN, the local network still sees your MAC address.

  • A VPN hides your IP from websites and external observers.
  • It does not hide your MAC from the local router/AP and potentially other hosts on the same network segment.

For whoever controls the local network, your MAC is a strong anchor for long-term tracking and cross-session correlation.

5.3. Network Logging and Legal/Corporate Exposure

Organizations might log:

  • MAC address
  • Assigned IP
  • Time and duration of sessions
  • Visited domains (or full URLs, if they’re doing deeper inspection)

Those logs can be:

  • Used by IT/security teams to trace behavior back to specific devices or users.
  • Requested by law enforcement, depending on jurisdiction and policy.
  • Retained for months or years.

MAC addresses make it much easier to answer: “Which physical device did this?”—especially inside a corporate or campus environment.


6. Vulnerabilities and Attacks Involving MAC Addresses

Now let’s move from privacy risks to direct technical attacks.

6.1. MAC Spoofing

Despite being a “hardware” address, a MAC address is almost always changeable in software.

On most systems, an attacker (or power user) can:

  • Run a command or use a GUI tool to set a different MAC address for their network interface.
  • Temporarily become some other device as far as the local network is concerned.

This creates several problems:

  1. Bypassing MAC Filters
    If an admin says “only MAC X can join this Wi-Fi,” an attacker can:
    • Sniff traffic to find MAC X.
    • Change their MAC to X.
    • Attempt to connect as that device.
  2. Impersonating Another Device
    On poorly segmented networks, an attacker might spoof the MAC of:
    • A trusted device
    • A printer or VoIP phone
    • A machine with special access
  3. Evading Naïve Tracking
    Attackers can rotate MAC addresses to make log correlation harder at the network’s basic level, although this doesn’t solve all tracking (they still may be fingerprintable by other traits).

Bottom line: MAC-based security is weak if it’s your main security control.

6.2. ARP Spoofing / ARP Poisoning

We mentioned ARP earlier. It’s how devices learn IP→MAC mappings.

The bad news:

  • ARP has no built-in authentication.
  • Any device on the local network can claim: “Hey, IP X is at MAC Y.”

An attacker can:

  1. Send forged ARP replies to victims saying, “The gateway (router) IP is at my MAC address.”
  2. Devices will start sending their traffic to the attacker.
  3. The attacker then forwards the traffic to the real gateway so everything still “works” but is now being intercepted.

This enables:

  • Man-in-the-middle attacks
  • Eavesdropping on unencrypted traffic
  • Session hijacking for protocols that don’t use proper encryption

While this is more about ARP than MAC addresses themselves, MAC addresses are the mechanism that make ARP spoofing possible: you’re tricking hosts into associating the wrong MAC address with a critical IP.

6.3. CAM Table Overflow (Switch Attacks)

Switches store MAC→port mappings in a Content Addressable Memory (CAM) table.

  • If an attacker floods the switch with frames from fake, random MAC addresses, the table can overflow.
  • The switch may fall back into a hub-like behavior, flooding frames out many or all ports.
  • This makes packet sniffing easier for the attacker, as more traffic becomes visible.

Again, MAC addresses are central: the attack abuses the very table that associates MAC addresses with physical ports.

6.4. MAC-Based Captive Portals and Session Hijacking

On some networks, access is tied to a MAC address:

  • You accept the terms or log in once.
  • The network then remembers your MAC as “authorized” for some time.

If an attacker can learn your MAC and spoof it, they may:

  • Hijack your authorized session.
  • Access internal resources or internet without authenticating.

If both your device and the attacker appear simultaneously with the same MAC, weird behavior can occur—dropped connections, ARP battles, or flapping routes.


7. Modern Defenses: MAC Randomization and Beyond

As MAC addresses became recognized as a privacy risk, operating systems started fighting back.

7.1. MAC Randomization in Wi-Fi Scanning

Many modern systems (iOS, Android, Windows, macOS) now:

  • Use random MAC addresses when actively scanning for Wi-Fi networks.
  • Rotate these random MACs over time.

This helps prevent:

  • Passive tracking of your device as it wanders past different access points.
  • Easy cross-location correlation based strictly on your Wi-Fi MAC.

7.2. Per-Network Random MACs

Newer OS features include:

  • A different random MAC per Wi-Fi network (SSID).
  • This random MAC is often stable for that network, but different from your real hardware MAC and from what you use on other networks.

This helps reduce:

  • Cross-network tracking (“Oh, this is the same phone from the coffee shop and the airport and the hotel”).
  • Linkability of activity across different venues.

7.3. The Limitations

Randomization is not magic. Some caveats:

  • Once you connect to a network, your per-SSID MAC often remains stable (so that network can still track you over time).
  • Some networks require your real MAC (e.g., enterprise setups, device onboarding, certain ISPs, or compatibility cases).
  • Other identifiers—like device behavior, OS version, user agent, timing patterns, and installed apps—can still be used for fingerprinting.

MAC randomization is a layer of friction, not an invisibility cloak.


8. Practical Advice: How to Live with MAC Addresses

You can’t get rid of MAC addresses. They’re baked into how Ethernet and Wi-Fi work. But you can manage how much power they have over your privacy and security.

8.1. For Everyday Users

1. Turn on MAC randomization where available.
Most modern phones and laptops have a setting like:

  • “Use random hardware addresses”
  • “Private Wi-Fi address”

Enable it, especially for public networks and auto-join scenarios.

2. Assume local networks can see you.
VPNs are great for hiding your traffic from your ISP and from websites, but:

  • The local network owner (coffee shop, airport, office) can still see your MAC and meta-traffic patterns (when you connect, roughly how much data).

Don’t treat public Wi-Fi as anonymously as a burner account. It’s not.

3. Be choosy with Wi-Fi networks.

  • Turn off automatic joining of random public networks.
  • Delete networks you no longer use.
  • Prefer personal hotspot + VPN if you’re in sensitive contexts and can afford the data.

4. Don’t rely on MAC spoofing as your privacy strategy.

  • For average users, it’s overkill and can break things.
  • It’s a tool, but not a complete solution. Sites and apps can still fingerprint you higher up the stack.

8.2. For Admins, IT, and Power Users

1. Don’t rely on MAC filtering as a security control.

  • Use it, at best, as a minor layer.
  • Real access control should be based on:
    • 802.1X / RADIUS
    • Certificates
    • Per-user authentication
    • Network segmentation and firewall rules

2. Monitor for anomalies, not just identities.

  • Look for strange ARP activity, unexpected MAC changes, flapping ports.
  • Use tools that detect MAC spoofing patterns and ARP poisoning.

3. Minimize and protect your logs.

  • If you’re logging MAC addresses tied to user identities, that’s personal data in many jurisdictions.
  • Have clear retention policies.
  • Protect logs like any other sensitive database.

4. Educate users.

  • Explain what MAC randomization does and doesn’t do.
  • Encourage updates; OS and driver updates often include better randomization and security patches.

9. MAC Addresses Through a Tech-Ethics Lens

MAC addresses are a great example of how infrastructure-level design choices made decades ago can collide with modern privacy expectations.

Originally:

  • The goal was simple: make local networking reliable and efficient.
  • Nobody was thinking: “What happens when billions of people carry wireless devices that constantly scream their hardware IDs into public airspace?”

Now:

  • Retail, advertisers, law enforcement, and attackers can all use this once-obscure identifier as a tracking hook.
  • OS vendors are retrofitting privacy protections on a system that was never built for anonymity.

The lesson:

The lower in the stack a design decision lives, the more it quietly shapes what’s possible later—good and bad.

MAC addresses are one of those quiet decisions. They don’t show up on marketing pages. You don’t see them in app permissions dialogs. But they matter, deeply, to how visible you are on every network you join.


10. Summary

  • A MAC address is a hardware-level identifier for network interfaces, used at the data link layer to deliver frames on local networks.
  • They’re necessary for efficient switching, plug-and-play networking, device management, and some access control use cases.
  • They also create privacy risks:
    • Long-term tracking on local networks and in public spaces.
    • Easy linking of network logs to specific physical devices.
  • Technically, MACs can be spoofed, and protocols like ARP can be abused for man-in-the-middle attacks and traffic interception.
  • Modern systems use MAC randomization to reduce tracking, but it’s not perfect, and local networks still see some identifier for you.
  • For users, enabling randomization, being cautious with Wi-Fi, and understanding the limits of VPNs are key.
  • For admins, MACs should be treated as one signal among many—not your primary security gate—and logs that tie MACs to people should be handled as sensitive data.

In other words: MAC addresses are the quiet ID tags your devices wear everywhere. You can’t entirely take the tag off, but you can at least understand where it’s visible, how it’s used, and how to stop it from becoming a leash instead of just a label.

The Weight of Technology


Leave a Reply

Your email address will not be published. Required fields are marked *