Forums › Life › Computers, Gadgets & Technology › The Computer Hardware Chart: Can You Identify Your PC’s Parts?
Surely it makes no difference of the MAC address is being spoofed, you reveal your ip address and that;s game over.
@iliesse 982405 wrote:
i have maybe not good explain the question.
A new computer which immediately fake his IP adress will never give his wifi identification, so this case is secure.
but a laptop using a real IP adress and which is under surveillance is giving the wifi indentification. installing tor after that is too late cuz he will always be found with his wifi ident
on nearly all modern Internet setups (with a router connected to the DSL/cable) the laptop would connect to a private network (along with anything else in the building) and get a different internal IP address. Everything connected to this router normally shows on the public Internet as the same IP address. The MAC number is usually not disclosed across the router unless someone has already put spy software on the laptop (some of which has been able work even if TOR or other privacy software is in use) they can remotely access the config pages of the router; or are located close enough to monitor the wireless signals.
Even then this doesn’t prove 100% that device has been used for any crime or that it defnitely was in a certain location; as external IP addresses often change and are allocated to areas which can be 5km or more apart.
@tryptameanie 982406 wrote:
Surely it makes no difference of the MAC address is being spoofed, you reveal your ip address and that;s game over.
SOME YEARS AGO I even 10 years, i saw it exists machines u can put betwee the wifi router and the connection line to know if some body is entering ur computer , does those things exist?
Wireshark maybe?
@tryptameanie 982409 wrote:
Wireshark maybe?
i gonna look on that site used mostly by detectives ,cops . they sell exsample guns to liste persons a few hunded meters away otr little gps to track somebody wherer he go, etc… i saw this in that kind of sellers
@tryptameanie 982406 wrote:
Surely it makes no difference of the MAC address is being spoofed, you reveal your ip address and that;s game over.
on some networks (especially DOCSIS/cable such as NTL/VM and many mobile networks) the same IP address is shared using multiple levels of NAT routing across 100 or more different customers. Also in somewhere like a University or a library there could similarly be any number of fixed desktops plus wifi guests all using the same IP address.
Exact geolocation is not so easy in these situations; however for perfectly rational technical reasons it is often the case that a company providing cable broadband and/or mobile networks also supplies the local government and public sector with the private networks used for CCTV cameras and fixed links used for portable radio equipment that rentaguards and cops often use.
As an example NTL (National Transcommunications Limited) was formed from a combination of local cable TV companies, and two public sector organisations that provided TV transmitters and other networks for ITV and commercial local radio, and DTELS which operated communications towers for the Emergency Services.
it is not surprising that companies like this feel obliged to co-operate with the demands of public authorities when required although getting accurate evidence quality data is still not a trivial task and isn’t usually done for minor stuff.
If you look at the article I posted a few days ago then look into each different case you’ll gain a bit more insight into what they do.
@General Lighting 982412 wrote:
on some networks (especially DOCSIS/cable such as NTL/VM and many mobile networks) the same IP address is shared using multiple levels of NAT routing across 100 or more different customers. Also in somewhere like a University or a library there could similarly be any number of fixed desktops plus wifi guests all using the same IP address.
Exact geolocation is not so easy in these situations; however for perfectly rational technical reasons it is often the case that a company providing cable broadband and/or mobile networks also supplies the local government and public sector with the private networks used for CCTV cameras and fixed links used for portable radio equipment that rentaguards and cops often use. +3
As an example NTL (National Transcommunications Limited) was formed from a combination of local cable TV companies, and two public sector organisations that provided TV transmitters and other networks for ITV and commercial local radio, and DTELS which operated communications towers for the Emergency Services.
it is not surprising that companies like this feel obliged to co-operate with the demands of public authorities when required although getting accurate evidence quality data is still not a trivial task and isn’t usually done for minor stuff.
i have the feeling that nothing is totally secure today
About time, you’re about right.
@tryptameanie 982415 wrote:
About time, you’re about right.
lol, what do u mean now
No I mean probably nothing connected to any public network is secure.
what is the solution, changing every 10 seconds the laptop,or ip adress?
@iliesse 982408 wrote:
SOME YEARS AGO I even 10 years, i saw it exists machines u can put betwee the wifi router and the connection line to know if some body is entering ur computer , does those things exist?
@tryptameanie 982409 wrote:
Wireshark maybe?
around the same era my mates had somehow managed to get NTL to connect up broadband to a squat (!)
they still just provided the Motorola modem and a poor software firewall so along with this goth hacker dude I built a router from this battered old PC (the case was half open as it had been salvaged from a skip) – we would often teach middle class hippies about cybersecurity by connecting up the monitoring software (not sure if it was called Wireshark back then) it did the same thing and showing them what goes back and forth through the network (including passwords and all sorts that were still sent in plain text).
However even then this is a lot of data and unless you know what you are looking for it is easy to get excessively paranoid from data traffic that is sent simply to keep networks operating correctly and this wouldn’t unearth other methods of surveillance.
It is true nothing is secure today but that is also the case for cops/feds.
Although (like many other places in Europe) it is no longer possible to listen to their comms directly on a radio scanner but the digital encrypted radios (and the base stations they connect to) give off a unique pattern of signals that even very basic equipment can detect within a range of 100m (possibly more depending on terrain).
OK the signal could equally be transmitted by a cop, ambulance worker or the council park ranger or dog warden but it is at least possible to know that some kind of public service worker is in your neighbourhood even if you cannot see them.
0
Voices
64
Replies
Tags
This topic has no tags
Forums › Life › Computers, Gadgets & Technology › The Computer Hardware Chart: Can You Identify Your PC’s Parts?