Wi-Fi Network Names Are a Treasure Trove of Personal Information

Open the Wi-Fi settings on your smartphone, and you'll see a list of nearby network names (SSIDs). Some are default names like "Buffalo-G-XXXX" or "aterm-XXXXXX," while others directly contain the owner's name or room number, like "Tanaka-Home," "3F-Suzuki," or "iPhone-Taro."

SSIDs broadcast far more information to the outside world than you might think. This article explains what can be gleaned from Wi-Fi network names, the privacy risks they pose, and the appropriate countermeasures.

7 Things That Can Be Read from an SSID

1. The Owner's Name

SSIDs like "Tanaka-Home," "YamadaFamily," or "iPhone-Hanako" directly reveal the owner's name. In apartment buildings, they can serve as clues for guessing who lives in which unit.

2. Address or Room Number

SSIDs like "301-WiFi," "Apt-502," or "3F-East" indicate room numbers or floor levels. By scanning Wi-Fi from outside a building and correlating SSIDs with signal strength, physical locations can be pinpointed.

3. Router Model and Manufacturer

Default SSIDs reveal the router's manufacturer and model. "Buffalo-G-XXXX" is Buffalo, "aterm-XXXXXX" is NEC, and "HUAWEI-XXXX" is Huawei. Once the model is identified, attacks exploiting known vulnerabilities for that model become possible.

4. ISP (Internet Service Provider)

Some ISP-provided routers set default SSIDs that include the ISP name. Knowing the ISP makes it possible to guess the default URL and password for that ISP's configuration page.

5. Security Awareness Level

Users who keep the default SSID are likely to have also left the router's admin password at its default. For attackers, a default SSID signals "security settings haven't been changed."

6. Hobbies, Preferences, and Political Views

Humorous SSIDs like "FBI Surveillance Van" or "Pretty Fly for a Wi-Fi" (a play on The Offspring's song) are harmless, but SSIDs containing political messages or offensive content can cause neighborhood disputes. There have been actual cases where a hotspot with the SSID "bomb on board" was detected on an airplane, causing a flight delay.

7. Network Purpose

SSIDs like "Office-5F," "POS-System," or "Security-Camera" reveal the network's purpose to attackers. If POS system or security camera networks are identified, they can become footholds for targeted attacks.

SSID Leakage Paths - Information Leaks Just by Carrying Your Device

The risk of SSIDs isn't limited to your home Wi-Fi name being visible. As discussed in the MAC address tracking article, smartphones may transmit previously connected SSIDs through Wi-Fi probe requests.

Preferred Network List (PNL) Leakage

Devices maintain a list of previously connected Wi-Fi networks (PNL). When moving with Wi-Fi enabled, the device broadcasts probe requests containing SSIDs from the PNL, asking "Is this network available?"

This mechanism can leak the following information.

  • Your home Wi-Fi name (if the SSID is unique, your home location can be identified)
  • Your workplace Wi-Fi name (identifying your employer)
  • Wi-Fi names of hotels you've stayed at (estimating your travel history)
  • Wi-Fi names of cafes and airports you've used

WiGLE - A Database of Wi-Fi Networks Worldwide

WiGLE (Wireless Geographic Logging Engine, wigle.net) is a database of Wi-Fi network location data collected by volunteers worldwide. SSIDs are linked to location data (latitude/longitude), and simply searching for a unique SSID can reveal the physical location of that network.

This means if your smartphone sends a probe request for "Tanaka-Home-5G" while you're out, and an attacker intercepts it and searches WiGLE, they could potentially identify your home address.

Malicious SSIDs - Evil Twin Attacks

Since SSIDs can be freely set, attackers can create a fake access point (Evil Twin) with the same SSID as a legitimate network.

For example, if a cafe's legitimate Wi-Fi is "CafeWiFi-Free," an attacker sets up an access point with the same "CafeWiFi-Free" SSID but with a stronger signal. Devices automatically connect to the stronger signal, so users unknowingly connect to the attacker's network, allowing their communications to be intercepted.

Understanding the risks of public Wi-Fi and using a VPN are fundamental defenses against Evil Twin attacks. Checking your IP address on IP Check-san to verify you're not connected to an unexpected network is also effective.

SSID Best Practices

  • Don't include personal information: Don't put your name, address, room number, or phone number in the SSID
  • Change the default SSID: Change it from the default so the router's model and manufacturer can't be guessed
  • Don't make it too unique: A globally unique SSID can be located via WiGLE. A generic name that doesn't contain personal information is ideal
  • SSID hiding (stealth mode) has limited effectiveness: Even with a hidden SSID, connected devices transmit the SSID in beacon frames. The security benefit is limited, and it actually reduces connection convenience
  • Regularly clean up saved networks: Delete Wi-Fi networks you no longer use from your device to reduce PNL leakage risk
  • Use WPA3: The latest encryption standard WPA3 not only improves encryption strength but also provides resistance to offline dictionary attacks

Summary - Your Wi-Fi Name Is a "Signboard"

An SSID is like a sign posted on your front door. Anyone passing by can read it, and a surprising amount of information can be inferred from it. Change to an SSID that doesn't contain personal information, clean up your saved networks, and use a VPN on public Wi-Fi.

Start by checking your current connection information on IP Check-san to understand which network you're using to connect to the internet.

Related Terms in This Article

SSID The identifying name of a Wi-Fi network. A string of up to 32 bytes used by devices to select which network to connect to. Wi-Fi Wireless LAN technology based on the IEEE 802.11 standard. Uses radio waves to connect devices to a network. VPN (Virtual Private Network) Technology that encrypts internet communications and routes them through a server in another location, protecting your actual IP address and communication contents. MAC Address A 48-bit physical address assigned to a network interface. Set during device manufacturing. Encryption Technology that converts data into a format unreadable by third parties. WPA2/WPA3 is used for Wi-Fi communication encryption.