WIFI Question Data Tracking

pertpvyztrzv's Avatar
I'm trying to figure out how to get an MP4 file onto ECCIE to show the depth of the reach of da gubmint, but it doesn't seem likely and links to the file on-line keep drying up - mysteriously. Originally Posted by Why_Yes_I_Do
ECCIE isn't going to host a bunch of attachments, too much space and space is $$$.

Try putting the file in proton drive or mega.nz then get a link from that service. Proton and Mega are encrypted, so that's a start.
pertpvyztrzv's Avatar
Sorry, I'm late to this discussion. I use a VPN (supposedly no log records), but I don't understand the "unique ID" aspect as it relates to tracking etc. Am I still leaving a trail despite the VPN? Would it be possible for you to briefly elaborate on the mechanics so those of us without a background in IT or cybersecurity can understand? Thanks.

IF you're feeling generous: how do some sites know I use a VPN? Why do they block me, and is there a workaround? Thanks again. Originally Posted by rico7
Kind of deep in the woods - I don't worry about my browser fingerprint. Your browser has a finger print that consists of everything a website can get from your browser - What kind of browser, extensions, fonts, width/height, what OS you use Mac or windows etc... You may be unique depending on all that or you may not.

TOR browser tries to combat this by making it's browser like everyone else, so you get lost in the masses. Security by looking like everyone else and not unique.

Like real fingerprints, if your fingerprint isn't in a database, they're not going to be able to associate your fingerprint with you, until you get caught. There are plenty of bigger things to worry about.

All Enterprise firewalls can determine what application you are using and can tell you're using a VPN. Banks and other sites think you're only using a VPN to hide criminal activity. Not a fan, but nothing you can do.

VPNs and Tor used to be blocked because there were list of IP addresses of VPNs and Tor exit nodes a firewall could use to block those IPs. That's not the case today. Firewalls are sophisticated today, they can look at more than just an IP address.

You MIGHT be able to bypass if a company is lazy and only uses IP lists by building your own so the IP you're coming from is unknown and unlisted anywhere.
rico7's Avatar
  • rico7
  • 02-27-2024, 10:00 AM
Kind of deep in the woods - I don't worry about my browser fingerprint. Your browser has a finger print that consists of everything a website can get from your browser - What kind of browser, extensions, fonts, width/height, what OS you use Mac or windows etc... You may be unique depending on all that or you may not.

TOR browser tries to combat this by making it's browser like everyone else, so you get lost in the masses. Security by looking like everyone else and not unique.

Like real fingerprints, if your fingerprint isn't in a database, they're not going to be able to associate your fingerprint with you, until you get caught. There are plenty of bigger things to worry about.

All Enterprise firewalls can determine what application you are using and can tell you're using a VPN. Banks and other sites think you're only using a VPN to hide criminal activity. Not a fan, but nothing you can do.

VPNs and Tor used to be blocked because there were list of IP addresses of VPNs and Tor exit nodes a firewall could use to block those IPs. That's not the case today. Firewalls are sophisticated today, they can look at more than just an IP address.

You MIGHT be able to bypass if a company is lazy and only uses IP lists by building your own so the IP you're coming from is unknown and unlisted anywhere. Originally Posted by pertpvyztrzv
Fascinating stuff - appreciate the response.
Sorry, I'm late to this discussion. I use a VPN (supposedly no log records), but I don't understand the "unique ID" aspect as it relates to tracking etc. Am I still leaving a trail despite the VPN? Would it be possible for you to briefly elaborate on the mechanics so those of us without a background in IT or cybersecurity can understand? Thanks.


IF you're feeling generous: how do some sites know I use a VPN? Why do they block me, and is there a workaround? Thanks again. Originally Posted by rico7
It is a simple DNS reverse lookup. VPN domains have a set of registered IP ranges so when you connect to a VPN on IP 203.132.45.166 they change the data packet so it has an IP of say.. 194.231.12.143 which is registered to THEM and their location.

Some sites have firewall rules that block any IP address that is registered to VPN companies..
The original question was this. Can the company where I was located know that I logged on to ECCIE my personal laptop? Can they go back and history and link my Eccie logo Yo my personal IP laptop??There’s not a server it was simply a spectrum modem.


I’m trying to figure out out if they could find this dirt on me if they were really interested.

This is not related to LE, the mrs, or Gvmt.

Employer / employee potential dispute
pertpvyztrzv's Avatar
The original question was this. Can the company where I was located know that I logged on to ECCIE my personal laptop? Can they go back and history and link my Eccie logo Yo my personal IP laptop??There’s not a server it was simply a spectrum modem.


I’m trying to figure out out if they could find this dirt on me if they were really interested.

This is not related to LE, the mrs, or Gvmt.

Employer / employee potential dispute Originally Posted by satx78209
The answer is always probably yes. In the responses has been ways to prevent that. But do they care?

If you're only worried about spectrum, if you were at a different location that didn't use spectrum, then no one at spectrum would have access to that info.

Only certain employees are going to have access to that info anyway. Without a court order or spectrum employee you really pissed off, I'm pretty sure your secret is safe.

Your data isn't only in your "modem", from your modem it travels through a bunch of Spectrums equipment. Which keeps logs of what's happening.

Why the spike in blood pressure? They're not going to have your login info, unless you give it to them. So you hit a website that talks about all sorts of stuff. Not like it's C**** P***. Even if they had that and wanted to be malicious, without knowing your username, it's pretty pointless.

Get back on your meds.
Without VPN Does not Work Tracking
So far, sites that were vehement about finding your actual IP (no comment there) can't locate it with Stealth Protocol.


If I really want to screw with the site, I manually route through Secure Core > Switzerland > any other EU country. The porn sites that come available that are not available in the US (much less TX) are staggering!


So the Lt. Governor of North Carolina posted... hypothetically...