Well, it’s actually more nightmarish. Your computer and every other device you use has a unique identifier, has embedded software and hardware down to a sub processor on the processor that is specifically there for access. Your computer has likely 30 unique fingerprint Id markers, your normal websites you visit are a fingerprint, your access of anything you log into fingerprint you, and even the cadence you type with can be used to locate you on any computer anywhere. Most every device listens to you, every purchase you make, water bills, power usage statistics, medical record, freinds, freinds of friends, phone records, …. This goes on forever. If you don’t want something attached to you, leave all electronics at home, drive to the wilderness,a d talk in person. Don’t have a car that has any dealer connected service (on star…). Don’t think powering off your phone is enough. Battery out only, why none do that anymore.
This can all be put together by AI in the most horrible out of context way to make you look like a Batman villain if they choose.
Every network card made has a "MAC" address and people pretend it's no big thing. To my understanding the MAC address (unique id) is actually passed out with every tcp packet you send out if you are behind a router. I've gotten around IP bans simply by changing my local MAC address. That could only work if my MAC was passed to the website in some way.
MAC Address is hardcoded to a chip, some software packages allow you to spoof it, but not many. Check out wireshark as a way to get really good info about what's coming off your NIC.
Sounds like ipv6 that carries the MAC vs ipv4 which strips it off. If you are running V6, that will do you in.
This is not an IPv4 / v6 issue - this is the TCP/IP stack and the processes that support it.
Back in my day we could block tracking via blocking cookies.
Good days… the game changed a long time ago.
Second hand pc with someone else's login/ email details for everything, leeching next doors neighbors wifi .
https://ssd.eff.org/module/what-fingerprinting That is tools people and private companies use. State level actors have way more tricks, guaranteed if they decided you warranted attention , a simple query would show that computer as used by you amd everything you do.
Well, i'm not disagreeing per say, however if i may your Honor, i live in a boarding house which has a communal open use pc - unless there is a witness placing me using that computer that my lawyer may cross examine, when would i ever find time to 'hate speech' while i'm busy doing volunteer good works in the community.
The FBI uses that information for someone who did nothing illegal.
You're a retard. Seriously, you're worried about things that aren't used against normal retards like me or you. You can also gain encryption keys by the sound a CPU makes. THAT MEANS YOU NEED TO KEEP YOUR CPU IN A SILENT ROOM!!!!!!!!!!!! No. Technological existence does not equal technological feasibility. Also I or anyone else can know specifically 100% of the information their computer shares over any network connection, and that information can be changed to whatever the user likes. It's meaningless.
Not used eh… ya, I was once an ignorant fool like you. I had a long lost childhood friend make it back to my circle of friends, he worked on algorithms. First for private industry, made a big name for himself ( savant really he was) them to a gov contractor. The one that manages and writes the code that is used to collect and sort everything on everybody.
He gave me my file. They know more about me, an unconcering nobody, than I or my mother do. It’s massive. This exists for everybody.
But keep calling people who know more about what exists retards, it helps your credibility.
ignroant fool
Fuck off. I know all of what you do on what is "possible" if you're a retard and let it happen.
trust_me_dude.png
No.
(post is archived)