Replies: 1 comment
-
It works beautifully. I just managed to spoof my FireTV stick's mac address, sign into a pesky hotel wifi captive portal and revert the mac address (with the FireTV stick now able to connect without captive portal). Many thanks and great job! 👍 (M1 Air, Big Sur, |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
This is an alpha release for testing purposes. Please try it out. Once I feel confident enough that everything works fine and I fixed the test suite, I'll release a "real" version. Thanks for your patience.
[BREAKING] Configuration directory moved from
/Library/Application Support/LinkLiar/
to
/Library/Application Suppoert/io.github.halo.LinkLiar
as this is more future-proof and I think the way Apple wants it.
[FEATURE] Choose among vendors (and custom prefixes) to be used when randomizing MAC addresses Request: randomize within a single vendor #27
[FEATURE] Do not show leakage icon for ignored interfaces Add option to not warn about leakage for certain interfaces #38
[FEATURE] Show which MAC address was specified by default
[FEATURE] Show paths to all relevant directories and files in developer menu
[UPDATE] Update MAC prefixes of "popular" vendors
This discussion was created from the release Big Sur.
Beta Was this translation helpful? Give feedback.
All reactions