It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by SonOfTheLawOfOne
Originally posted by QuantriQueptidez
The only way to get even close to browsing anonymously these days is to hop on a public wifi hot spot.
Even tunneling through a vpn with ssl won't save you if someone really wants to find ya.
A secure linux distro on a laptop with truecrypt and tor operating solely on open wifi is about as close as you can get to anonymity. Even then you gotta worry about bastards sniffing your keystrokes through the air via remote devices. Who knows how many such devices exist around high density areas. Then you can use a click keyboard, but maybe you gotta look out for argus drones directly viewing your screen, and on and on. .
You get it.
Every PC on the planet has a unique address, not an IP, but a MAC address. All IP registrations are associated to these MAC addresses so that every TCP packet you send over the net contains a way to trace the packets back to the originating machine. As long as they can capture the TCP/IP traffic, they can find you, and it only takes one single packet out of the billions most people send a day. SSL only protects you over the wire during transmission, but there is still a TCP stack that contains your MAC address.
They will always find you because of this. The only way to throw them off is to start manipulating the traffic you send by altering or randomizing MAC addresses combined with masked IP addressing.
~Namaste
Originally posted by SonOfTheLawOfOne
They will always find you because of this. The only way to throw them off is to start manipulating the traffic you send by altering or randomizing MAC addresses combined with masked IP addressing.
~Namaste
Originally posted by TrueAmerican
Originally posted by SonOfTheLawOfOne
They will always find you because of this. The only way to throw them off is to start manipulating the traffic you send by altering or randomizing MAC addresses combined with masked IP addressing.
~Namaste
Yeah but wait. How does VM deal with this? According to what I read, VM operates in a manner that disassociates itself from the hardware. So I wonder if that includes the MAC address when sending packets over TCP/IP. Anyone know?
Originally posted by CPYKOmega
reply to post by buddha
How do 40,000 people watch 2.769 billion?
Originally posted by SonOfTheLawOfOne
Originally posted by CPYKOmega
reply to post by buddha
How do 40,000 people watch 2.769 billion?
With technology like Narus, combined with super computers and machine intelligence that do the work of tens of thousands of math crunchers and code breakers.
Of course 40,000 people aren't sitting there monitoring 50,000+ people each (which is about what it would take each NSA analyst to watch over), but a few well placed devices most definitely do. You need to go look at what the device does and you'll understand how it is they do this. Combined with machine learning and massive computing power, the algorithms (over time) have been tweaked to find the most important bits of information. However, the fact of the matter remains, they have the data and can go through it anytime they want.
~Namasteedit on 30-6-2013 by SonOfTheLawOfOne because: (no reason given)
Originally posted by TritonTaranis
the fact is to do what you or others only guess as being done is IMPOSSIBLE and not to mention a massive waste of time money & resources
Seriously how is a computer collecting dust a threat to you? do you not understand how it works?
Originally posted by QuantriQueptidez
Originally posted by TritonTaranis
the fact is to do what you or others only guess as being done is IMPOSSIBLE and not to mention a massive waste of time money & resources
Please elaborate. What exactly is "IMPOSSIBLE".
Seriously how is a computer collecting dust a threat to you? do you not understand how it works?
Better than you, apparently.