IP Addresses (forum posts) confidential??

Nice to see there are a few people who know what they are talking about. You are absolutely correct in that IP addresses cannot be faked. And I agree with all your other points. Sadly, too many users on this site open their mouth without really knowing what they are talk about. Nice to see a few stand outs!!

Quote from jprad:

There's no such thing as a "false" IP address. Spammers are most often charged with theft of service because they've hijacked someone's server via a vulnerability and used that server, and their internet connection, to distribute their spam.

And, no, there are ways you can access the internet in a completely anonymous fashion.

Any free, open access, WiFi is a potential entry point. Slap a virtual machine running a Linux distribution that only runs in memory along with a network card that allows the MAC address to be changed and you're good to go.

However, all that only gives you anonymous internet access. It's not going to help you one whit if you're already under surveillance by the authorities nor will it help you with access to a particular site, like this one, that requires a login that's authenticated via an initial email that contains a verification URL.

For that layer you'd need to get a truly anonymous email account, which isn't all that easy these days.
 
what a bullshit!!!!

NO, your web and surf history is not written to ANY hardware medium at least not irrevocably. You can easily wipe out your surf history and if you really want to make sure that it is wiped out then you can do a low-level format. There are very simple ways to ensure that all your history is gone. Furthermore, there are simple ways to ensure that you limit access to third parties to access your current, existing, browsing activities. So, most of what you said in that regards is PLAIN WRONG.

When you talk about screen loggers those are software pieces that install on your machine and take screen grabs at frequent intervals and send it back them back to the originator. Keyloggers are also frequent in regards to malicious computer attacks. There is no magic nor anything fancy about such tools, its not even fancy to hide them from virus or trojan scanners. There are techniques to hide the outgoing data stream and merge it with data packets that are recognized by the firewall and scanners to be safe.

But what you said is utter bullshit, that you can read screens or key strokes from the room next door without installing any thing on the target machine. You may be able to decypher text sent over the internet if the packets are not encrypted but certainly can you not read the screen unless a specific hardware or software piece is installed on the target machine (not the attacker machine). You seem to be a little paranoid to say the least.

Same crap than what you wrote on this thread:
http://www.elitetrader.com/vb/showthread.php?s=&threadid=277189&perpage=6&pagenumber=8


Quote from Ghost of Cutten:

Nothing on the internet is confidential. Anywhere you post, automatically gets your IP - or if you use a proxy, they get your IP.

Furthermore, your computer hardware can be looked at and will show all the sites you have visited since you started using the computer - only way to prevent it is to destroy your network card and hard drive.

With the right technology, you can read someone's computer screen as they type, from another room, through walls etc. Requires lead-shielding to prevent 100%.

Even without an IP, you can use the info from a given person to profile them. Once you have a certain amount of browsing sessions & posts, the profile accuracy rises pretty high.

The only truly secure computer is one with RAM only, that never connects to the internet. and is kept physically locked away with intruder alarms in its storage place etc.
 
One additional thing: you will never find me telling you how to do things against the public interest. My job was to protect corporations information and I still do even though I don't work for them now. I can vaguely tell you well known information, but not specific details.

I'm sure many answers on this thread are put here in a similar vein.
 
Quote from CalVolibrator:



When you talk about screen loggers those are software pieces that install on your machine and take screen grabs at frequent intervals and send it back them back to the originator.[/url]

I think that guy was referring to electromagnetic field generated by CRT tube that could be used to read screen from proximity location and not software. That is why he talks about led shield (I guess that would have to be Faraday cage but I am not that good in physics). My question is if current LCD screens are generating enough of this disturbance. It is not much relevant these days but maybe someone knows few technical details about this.

On the paranoid side; I would assume that each piece of hardware has some built in logic or firmware hole that would allow to identify or access such computer without anybody knowing it. Chinese are doing it and I would be surprised if US would just sent processors etc. to foreign countries without being able to "do something"
 
Quote from vicirek:

I ...... Chinese are doing it and I would be surprised if US would just sent processors etc. to foreign countries without being able to "do something"

You mean something like STUXNET?

http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet


Years ago sitting in a weekly meeting with the top technical people in areas for a company, we were discussing a spybot program recently discovered inside our company. Since I was considered the leading expert in this area, eventually it came to me to speak on what to do about it. I think we should contact the author and license it for the company I said.

When the laughter died down, I continued. Consider how hard it is for me to release an upgrade system wide within a day to 2000 programs on varied ever-changing platforms, some of which we don't even know all the internal technical details of. Management approval, customer permissions, project office, scheduling outages and people, testing etc. These guys released something that updates itself rapidly, secretly, and without a single user complaint that we have heard. I want that technology for our company. It is the future of middleware software technology.

... after some thoughtful looks, I then explained what actions we would really do and even more important, how we would prevent one like it from entering our company again ....
 
Quote from StarDust9182:

You mean something like STUXNET?


One thing funny about Stuxnet is that it is huge in size in comparison to average virus so it is easy to miss.
 
I just depends on how bad they want to find you. How much resources they throw at. I could dink around with Maltego and find out stuff at ET members.

Of course if I was Snowden with xkeyscore I could find out all in a moment.
 
There only person that can do that is the website owner. If the person has committed a crime against you, you're going to have to get a judge to issue a warrant for the site owner to give your lawyer that info. Of course the info is recorded on the owner's server somewhere, you just can't get to it. You can find our what is my IP address by just typing it on Google.

You can find our how to change ip address but you will not get the poster's IP address voluntarily.

Let us know what the outcome of your search is.
 
Yes...it's possible to identify someone via there IP address.

However, you can give a false IP address if you knew how to do it. In fact, most hard core spammers, auto spam bots or trouble makers are most likely to use a false IP address hide their true identity.

Yet, for serious crimes via the internet, big brother can easily find you if they wanted too (check out google for latest news about spammers, folks caught sharing copyright protected music et cetera)...all were using false IP address and other tools to hide their identities.

Lets put it this way, if you're going to commit a crime via the internet that could land you in jail or a huge litigation fine...if someone wants you bad enough...they can find you. :D

Mark
I am agree with mark that anyone can find with IP address and most of spammer use proxy server to make spams
 
Back
Top