updated 09:21 am EDT, Wed June 4, 2014
Combination of common MAC string, Aircrack-NG cuts off Glass internet access
An artist has developed a utility to detect Google Glass devices attempting to connect to a Wi-Fi device. The app, compatible with Raspberry Pi and other mini-computers, detects a unique string in the MAC address common to all Google Glass devices so far, impersonates a conventional Wi-Fi network, and sends a de-authorization command to the Glass, cutting it off from the Wi-Fi router.
"To say 'I don't want to be filmed' at a restaurant, at a party, or playing with your kids is perfectly OK. But how do you do that when you don't even know if a device is recording?" designer Julian Oliver told Wired. "This steps up the game. It's taking a jammer-like approach."
Perhaps disregarding widespread governmental surveillance in open places, Oliver claims that "these are cameras, highly surreptitious in nature, with network backup function and no external indication of recording. To focus on the device is to dance past a heritage of heartfelt protest against the unconsented (sic) video documentation of our public places and spaces."
Should the approach be more easily implemented to the common user, or at a business, it would make prohibitions on the wearable enforceable at a networking level. While it wouldn't prevent local storage of video, the Glass capacity is very small, and any recordings would be brief. Oliver claims that future versions of the app will be capable not only of disconnecting from any Wi-Fi connection with Aircrack-NG, but it can also sever connections with the user's smartphone.