Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: CodeToad
MAC addresses have nothing to do with the Internet routing of traffic.

LMAO! Are you serious?

Are you familiar with NAT, sir? If you think that your public IP address is the sole identifier of traffic on your network, then you should probably stop responding altogether. If you're a run-of-the-mill home user, your public IP address is likely dynamic, meaning you could get a new IP address at any time. The MAC address of your ISP router, however, never changes.

The traffic that routes out of your home network, however, is not identified by your router's MAC address. If you were to use Wireshark on your home network, outbound, say TCP 53 for DNS, you would see MAC addresses encapsulated in the frames. These identify the computer/device from which the traffic originated. Every device on your home network has a unique MAC.

Introduce a proxy to this, however, and now every device on your home network APPEARS to be originating from a single device. Turn off logging on that device, and any Fed coming to seize equipment is going to have one Hell of a time identifying the originator of that equipment. Any lawyer worth his/her weight would have charges dismissed on the grounds that they could not identify if the traffic was sent from a specific suspect machine or, say, someone who cracked your wifi password.

If you use Tor endpoints, the likelihood of them finding your home address is virtually impossible, dependent really on how many Tor endpoints through which you route. I suggest 5 at a minimum.

That's my point here. You're arguing that once they have your IP address, it's easy peasy to hang you up for something or find your personal information. My point is that if you obfuscate your traffic pathways through Tor and proxy, the likelihood of them finding your actual IP address is very low.

52 posted on 08/11/2014 9:31:22 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 50 | View Replies ]


To: rarestia

“Are you familiar with NAT, sir? “

You obviously haven’t a clue what I am talking about. You think NAT will prevent anyone from knowing what is sent to your IP address?

Do you really think the fed will come to your house and verify what device originated a request? You are a silly person if you think that.

The fact that some data went to your house is all they need.

“My point is that if you obfuscate your traffic pathways through Tor and proxy, the likelihood of them finding your actual IP address is very low.”

You make no sense. They already know your IP address. They are not seeking it. When you originate a request from your house they already have your IP. You cannot spoof that in any way.

Try drawing a diagram of what you are talking about instead of just listening to your words.


53 posted on 08/11/2014 10:00:37 AM PDT by CodeToad (Romney is a raisin cookie looking for chocolate chip cookie votes.)
[ Post Reply | Private Reply | To 52 | View Replies ]

To: rarestia

Just how do you think that Proxy is going to prevent tapping of yourdata?

54 posted on 08/11/2014 10:06:42 AM PDT by CodeToad (Romney is a raisin cookie looking for chocolate chip cookie votes.)
[ Post Reply | Private Reply | To 52 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson