Party Vibe

Register

Welcome To

The Computer Hardware Chart: Can You Identify Your PC’s Parts?

Forums Life Computers, Gadgets & Technology The Computer Hardware Chart: Can You Identify Your PC’s Parts?

  • This topic is empty.
Viewing 15 posts - 16 through 30 (of 66 total)
  • Author
    Posts

    • Subscriber

      Masking the wifi number is not possible


        Subscriber

        a used laptop is like a used phone


          Subscriber

          is it easy to change a wifi card???

          Yes that’s right. Your computer can be identified but that in no way identifies a user or location.

          you can use a USB wifi stick and that should present a different MAC address (the internal number) to the router.

          All network hardware has this MAC address (different from internal or external IP addresses) but it can be spoofed by other software (or simply by using a different device to connect the computer to the network).

          Tracking such data from the other side of a firewall/router (which routes one public IP to other private ones inside a building) is way harder than monitoring GSM mobile phone traffic and neither is easy even for feds/cops or the engineers who have to keep the stuff working. Normally the MAC numbers of internal equipment should not be seen the other side of the firewall (the main internet) unless the router itself is backdoored (sometimes done so the telecom company can carry out remote support) but in reality it is rare for cops/govt to bother with surveillance at this level unless they genuinely think someone is selling kilos of hard drugs or involved with terrorism.


            Subscriber

            @tryptameanie 982393 wrote:

            Yes that’s right. Your computer can be identified but that in no way identifies a user or location.

            no, cuz when he is located the first time, before u use tor, they already know where is located te laptop

            so what, it’s a lap[top, designed to be moved. Yes you can replace the wifi card.


              Subscriber

              no if u dont move its not good, the solution would be to move the laptop and install tor, cuz a lapotp, alreasdy located can try to simulate an other IP but they have already the location


                Subscriber

                @tryptameanie 982396 wrote:

                so what, it’s a lap[top, designed to be moved. Yes you can replace the wifi card.

                if u replace the wifi card its the solution, which would be equivalent as changing a IMEI Number from a phone. GL Just wrotte that the cops or terrorism police can with help of the phone company find the wifi number which i supposed is that MAC number???

                @iliesse 982397 wrote:

                no if u dont move its not good, the solution would be to move the laptop and install tor, cuz a lapotp, alreasdy located can try to simulate an other IP but they have already the location

                TOR doesn’t install really and you’d be better using the TAILS live operating system. It’s here

                https://tails.boum.org/


                  Subscriber

                  @General Lighting 982394 wrote:

                  you can use a USB wifi stick and that should present a different MAC address (the internal number) to the router.

                  All network hardware has this MAC address (different from internal or external IP addresses) but it can be spoofed by other software (or simply by using a different device to connect the computer to the network).

                  Tracking such data from the other side of a firewall/router (which routes one public IP to other private ones inside a building) is way harder than monitoring GSM mobile phone traffic and neither is easy even for feds/cops or the engineers who have to keep the stuff working. Normally the MAC numbers of internal equipment should not be seen the other side of the firewall (the main internet) unless the router itself is backdoored (sometimes done so the telecom company can carry out remote support) but in reality it is rare for cops/govt to bother with surveillance at this level unless they genuinely think someone is selling kilos of hard drugs or involved with terrorism.

                  exactly, but this wifi number that the company is having is used twith phones to know when a phone is stolen or not. the phone company can do the same with computers, a phone has also a firewall, smartphones are like a computer, no?


                    Subscriber

                    @General Lighting 982394 wrote:

                    you can use a USB wifi stick and that should present a different MAC address (the internal number) to the router.

                    All network hardware has this MAC address (different from internal or external IP addresses) but it can be spoofed by other software (or simply by using a different device to connect the computer to the network).

                    Tracking such data from the other side of a firewall/router (which routes one public IP to other private ones inside a building) is way harder than monitoring GSM mobile phone traffic and neither is easy even for feds/cops or the engineers who have to keep the stuff working. Normally the MAC numbers of internal equipment should not be seen the other side of the firewall (the main internet) unless the router itself is backdoored (sometimes done so the telecom company can carry out remote support) but in reality it is rare for cops/govt to bother with surveillance at this level unless they genuinely think someone is selling kilos of hard drugs or involved with terrorism.

                    traking a mobile with the gsm position is different then tracking a phone with his IMEI number, no?

                    @iliesse 982400 wrote:

                    exactly, but this wifi number that the company is having is used twith phones to know when a phone is stolen or not. the phone company can do the same with computers, a phone has also a firewall, smartphones are like a computer, no?

                    smartphones (and all GSM phones) are computers but have always been more closely monitored – the end user has to pay for the data traffic, so the mobile company requires a way of identifying them for billing purposes and shutting off the service (other than 112 calls for some networks) if the bill is unpaid

                    Added to which the device always needs to register to base stations with the strongest signals so it still works when the user is moving around.

                    With modern smartphones and broadband internet a whole industry has arisen funded by gathering and selling data about users for marketing / advertising purposes which also occurs on tablets, laptops and desktops unless suitable ad blockers/privacy software is installed. All of this data gathering by private companies is what can make all of these devices insecure

                    @iliesse 982402 wrote:

                    traking a mobile with the gsm position is different then tracking a phone with his IMEI number, no?

                    both are linked. an organisation tracking one phone user would require the IMEI number; otherwise they would not know if they were watching the correct target…


                      Subscriber

                      i have maybe not good explain the question.

                      A new computer which immediately fake his IP adress will never give his wifi identification, so this case is secure.

                      but a laptop using a real IP adress and which is under surveillance is giving the wifi indentification. installing tor after that is too late cuz he will always be found with his wifi ident

                    0

                    Voices

                    64

                    Replies

                    Tags

                    This topic has no tags

                    Viewing 15 posts - 16 through 30 (of 66 total)
                    • You must be logged in to reply to this topic.

                    Forums Life Computers, Gadgets & Technology The Computer Hardware Chart: Can You Identify Your PC’s Parts?