Someone just tried to assassinate Trump

The main point is we do this to other countries and they do it to us- so be suspicious of anything you see on the web- especially if you like it and want to believe it.


Some informative content.

Mike knows all this but the rest of us primates can probably learn something from it.




Bottom line is- If the Man turns his focus on you- you cannot hide for long.
 
The main point is we do this to other countries and they do it to us- so be suspicious of anything you see on the web- especially if you like it and want to believe it.


Some informative content.

Mike knows all this but the rest of us primates can probably learn something from it.




Bottom line is- If the Man turns his focus on you- you cannot hide for long.
Pretty much I don't believe anything I read online, well except for what @Ddays puts in the Rabbit Hole...........
 
The main point is we do this to other countries and they do it to us- so be suspicious of anything you see on the web- especially if you like it and want to believe it.


Some informative content.

Mike knows all this but the rest of us primates can probably learn something from it.




Bottom line is- If the Man turns his focus on you- you cannot hide for long.
The most common way to identify a device is via web browser cookies. Most web sites don't work properly without the site uploading several cookies. The cookie can contain arbitrary stuff. When multiple sites participate in cookie algorithms (common to support advertising) then the browser/host unique identity can be known with high confidence. As soon as you log into a participating site, then they know who you are. This is a reason that web browser choice is important, and particularly control of which cookies are stored, and for how long.

Cell phone "apps" are often based on an embedded browser. When you use the social networking app, you are already identified as soon as you log in. It is important to recognize that many "apps" are web browsers.

If the browser vendor also operates/participates in advertising based revenue, it is reasonable to assume that the browser is less trustworthy as pertains to your identity because their income depends on revealing it.

IPv6 address can be partially based on the hardware MAC address (automatic/self assignment), but they may also be assigned centrally such as via DHCPv6. Devices using legacy IPv4 automatically have an IPv6 address since they map into the IPv6 range.

But many/most network clients are behind some sort of address translation (NAT). In this case your own router might re-write all of the packets, or the ISP or corporate router might do the NAT. The NAT assignments may be only temporary so the next day (or even the next connection) may use a different address.

VPNs can provide some value (changing geographic location) but the desired obfuscation may already exist.

The most likely failure to conceal identity is with browser cookies.
 
The most common way to identify a device is via web browser cookies. Most web sites don't work properly without the site uploading several cookies. The cookie can contain arbitrary stuff. When multiple sites participate in cookie algorithms (common to support advertising) then the browser/host unique identity can be known with high confidence. As soon as you log into a participating site, then they know who you are. This is a reason that web browser choice is important, and particularly control of which cookies are stored, and for how long.

Cell phone "apps" are often based on an embedded browser. When you use the social networking app, you are already identified as soon as you log in. It is important to recognize that many "apps" are web browsers.

If the browser vendor also operates/participates in advertising based revenue, it is reasonable to assume that the browser is less trustworthy as pertains to your identity because their income depends on revealing it.

IPv6 address can be partially based on the hardware MAC address (automatic/self assignment), but they may also be assigned centrally such as via DHCPv6. Devices using legacy IPv4 automatically have an IPv6 address since they map into the IPv6 range.

But many/most network clients are behind some sort of address translation (NAT). In this case your own router might re-write all of the packets, or the ISP or corporate router might do the NAT. The NAT assignments may be only temporary so the next day (or even the next connection) may use a different address.

VPNs can provide some value (changing geographic location) but the desired obfuscation may already exist.

The most likely failure to conceal identity is with browser cookies.
1000033719.jpg
 
Top Bottom