For work purposes I have to use a not open source software that collects and sends to the producer MAC address, other device IDs and other hardware datas (from its privacy policy, which is not very exhaustive). Is there a way to:
- find out what exact data the app stores, and
- spoof them?
I suppose I could just run the app into a virtual machine, but I don't know if it would be sufficient to mask all the data and my PC isn't very powerful, so running a virtual machine is usually a pain.
I work with an Ubuntu Desktop 20.04 device to which I have root acces, so I can do whatever is needed. Open source only solutions would be much appreciated.
Some more informations (update 1)
I forgot to specify some very important informations.
- The software requires internet access (it's for videoconference purposes), so just blocking it in the firewall is not an available solution. That's what I already do with other software, but in this case it's just not an option.
- I have already tried to ask to producer what data they collect, but the legal time for an answer has already expired and they didn't answer - but that's what I expected, as it looks like they're not subject to the GDPR.
- The app is not run on a work machine - it's a software I've been required to use for home working due to coronavirus epidemic.
Virtualisation (update 2)
Some answers suggest to use virtualisation solutions like Firejail, but as far as I understand those softwares allow a "software isolation", where I need a sort of "hardware isolation" (meaning that the app must not have access to data about my hardware). Obviously I might be missing something - if that's the case please explain it.