passer I really don't like the idea of bleeding my SSID crums all day, everywhere I go so MAGFA can pad their already fat databases even more. That disturbed me more than the minor inconvenience.
It is a common misconception that Wi-Fi clients always search for networks by transmitting network SSIDs constantly. Wi-Fi is designed so that access points beacon, not clients. The exception is so-called "hidden" access points, which have beaconing disabled - clients are forced to poll for them, and this does leak information.
The solution is to not configure a so-called "hidden" AP, because the "hiding" doesn't work, because an eavesdropper can see your network whenever your authorized client connects to it (hours every day). Use a long rare SSID with a strong password, set your AP to beacon as it was designed to, and let your device's passive scanner and anonymous prober work as they were designed to.
See: https://grapheneos.org/usage#wifi-privacy also
https://vpnoverview.com/news/wifi-probe-requests-can-expose-identifying-information-study/