Skip to content

Fundryi/HWID-Privacy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

141 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hardware Identification (HWID) Privacy Guide

Disclaimer: This guide is for privacy research, hardware fingerprint testing, and education. It is not for violating any Terms of Service. What this guide is: A deep, technical hardware privacy guide about spoofing/changing hardware identifiers to make a machine as unidentifiable and untraceable as possible under advanced fingerprinting.


Table of Contents


Hardware Categories & Evasion Strategies

1. Motherboard

Serial Spoofing

  • Complete Guide: Motherboard Spoofing Guide
  • Key Points:
    • Use DMIEdit (for AMI BIOS)
    • Change only 2–5 digits of original serial
    • Avoid odd patterns (e.g., SPOOFER-XXXX)
    • Reflash BIOS and clear CMOS after changes

RGB Control/USB Serials

  • Intel: Disable USB ports used for RGB in BIOS (some boards provide per-port toggles).
  • AMD (AM4/AM5): Unplug RGB headers or use boards with hardware toggles (e.g., ASUS ROG, MSI).
    • Note: Some RGB controllers (e.g., MSI Mystic Light) expose distinct USB serials.

2. Storage

NVMe SSDs (M.2)

SATA SSDs (2.5")

Modifying these drives can void warranties.
Software/BIOS-based RAID0 is generally virtual and unsafe for HWID evasion.

Hardware RAID

  • Why: A proper hardware RAID controller prevents the OS (and fingerprinting agents) from querying individual drive serials.
  • Examples:
    • S322M225R (for M.2 drives).
    • LSI/MegaRAID models for SATA/SAS drives.
  • Note: True hardware RAID tends to cost more, but it helps mask original drive identifiers on a lower level.

3. Network Interface Card (NIC)

MAC Address Spoofing


4. GPU

  • NVIDIA: UUID accessible via nvidia-smi.
    • No stable public spoofing guide is widely known. Advanced driver-level hooking may exist, but it's risky and can be flagged.
    • NVIDIA GPU UUIDs are not always globally unique, but they can still be used for correlation.
  • AMD: No publicly documented UUID. Generally seen as safer for HWID privacy.

5. RAM

  • Null Serials:
    • Corsair DDR4/DDR5
    • GEIL DDR4/DDR5
    • Trident Z G.Skill DDR4/DDR5

6. USB Peripherals

  • Keyboards/Mice:
    • Roccat (now Turtleshell), Xtrfy models and "all" Razer products should not have USB serials.
  • USB Sticks: Some “UDisk” drives default to 00000000
    • Verify with USBDeview.
  • Avoid: Devices with hardcoded hardware serials you cannot edit.
    • Don't trust software claiming to hide USB serials via registry edits; those methods are useless.
    • Any advanced fingerprinting stack can pull serials directly from the USB protocol. Registry changes do not hide that data. You can validate this yourself: hide USB devices in the registry, then inspect traffic with a USB debugger; the serials still appear.

7. EDID / Monitor Spoofing

  • Why It Matters: Monitors contain EDID data with a potentially unique serial.
  • Tools:
    • Fuser or Dr.HDMI (4K version).
    • EDID can be dumped, edited in a hex tool, and re-flashed via these devices.
  • Result: The monitor appears as a different device, reducing traceability.
  • Using a Fuser on 🍊 is not recommended, even with EDID spoofing.

8. Router (ARP Table Isolation)

  • Hardware: GL.iNet running OpenWrt firmware or a custom-flashed OpenWrt router.
  • Process:
    • Change the router's MAC and hostname.
    • Change the MAC of the port you're using on the router.
      • (This is different from the router's main MAC!)
    • Plug only your target test machine into the router's LAN port.
    • Connect the router's WAN port to your home router.
      • Avoid connecting other devices, so the ARP table shows only your target test machine.
      • And don't worry about those ARP addresses; these are normal and not unique. They're created by Windows:
        • 224.0.0.22 01-00-5e-00-00-16 static
        • 224.0.0.236 01-00-5e-00-00-ec static
        • 224.0.0.251 01-00-5e-00-00-fb static
        • 224.0.0.252 01-00-5e-00-00-fc static
        • 192.168.8.255 ff-ff-ff-ff-ff-ff static
        • 239.255.255.250 01-00-5e-7f-ff-fa static
        • 255.255.255.255 ff-ff-ff-ff-ff-ff static

9. TPM

  • Complete Guide: TPM Spoofing Guide
  • Warning: dTPM is flagged by some strict telemetry stacks (e.g., 🍊).
  • Current Recommendation: Use fTPM for 🍊/🍒.
    • Since 2025-04-04, 🍒 enforces fTPM if you’re flagged; dTPM no longer works there.

HWID Checker References


Contribution & Updates

  • Additional NIC spoofer models may be listed in the future.
  • This guide evolves as new findings emerge.

Credits

Credits are a weird thing: not everything can be traced, and a lot of work/info in this guide came from many different places and people. I only list the people I know helped or are responsible for these sections in the first place.

  • Storage guide/info: Priventive.de
  • Network guide/info: fA, and "the collective hive mind of the internet"
  • EDID guide/info: fA (he did not invent the wheel, only gave me the info)
  • The broad base guide/structure was written by a "French", Old Guide Link
  • Fundryi for pasting/collecting this info and putting it out for everyone in one place (☭ ͜ʖ ☭)

meow

⠀⠀⠀⠀⠀⠀⣀⣀⣤⣤⣴⣦⣦⣀⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⣠⣾⡿⠛⠛⡉⣉⣉⡀⠀⢤⡉⢳⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⣀⣤⣾⡿⢋⣴⣖⡟⠛⢻⣿⣿⣽⣆⠙⢦⡙⣧⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⠖⠒⠻⠻⠶⣦⣄⠀ ⠉⣿⢸⠁⣸⣥⣹⠧⡠⣾⣿⣿⣿⣿⣧⡈⢷⣼⣧⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣿⣾⣿⣿⣶⣦⣈⠈⠻⣤ ⠀⢹⡇⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡟⣫⠀⠙⣿⣿⣿⣿⣷⡄⣽ ⠀⠀⠳⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⣀⣿⣟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⠀⠀⠀⠀⠈⠙⠻⢿⣿⣿⣿⣿⣿⣿⣿⠭⠛⠉⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠉⠉⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡠⠒⡊⠙⠉⠉⠉⠓⠲⠤⡀⠀⠀⠙⠿⣿⣿⣿⣿⣿⣿⣿⠏ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠐⠿⣦⣴⣿⣶⣶⠀⠠⠀⣰⣤⣿⣦⠀⠀⠀⠀⠉⠙⠛⠻⠛⠁⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⢛⠃⢀⣄⠀⣿⡿⠟⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠊⠟⠋⠈⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢦⣄⡀⠀⠀⢀⣀⣠⣴⡿⣿⣦⣀⠀⠀⠀⠀⢀⣴⠏⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⠛⠻⠿⠉⠉⠉⠉⠉⠑⠋⠙⠻⡢⢖⡯⠉⠀⠀⠀⠀⠀

About

This guide focuses on privacy and provides a baseline for bypassing HWID collection by companies or software. While not exhaustive or foolproof, it offers foundational steps to enhance your privacy.

Resources

Stars

Watchers

Forks