Message from @Nathan James 123
Discord ID: 634090117966856212
how's that work
The address is based off your MAC address
got it so far
That address will then move from cellphone tower to cellphone tower
Uniquely tracking that device as it transits
So in the address there will be a unique identifier to that device (Your phone) which will be identical no matter what address you're given
It will be able to link specific devices to website access, application usage, etc.
Even more than IPV4 could
got it
but you dont use/dont believe in VPNs?
So, spoof you mac address and run through a VPN
if i recall
I do
And use
ah
was someone else
Both, those are still vulnerable
Either from 0days we don't know about, or the VPN provider themselves @Crafty
yeah, i'm with you
VPNs are only as safe as far as you trust the VPN provider
Exactly
*Your ISP still does control your data, but not to the same extent, as it doesn't know what you're doing*
still, being that most ISPs don't even keep up the a pretence of respecting your privacy i guess it's a step up
Legally in the UK they're required to log every website you visit for 2 years
Snoopers Charter for you
so if you wanted to clean out your history as it were, you'd have to use a vpn seamlessly for 2 years
and even then you'd not know if they retained info
They likely retain more information than the law requires them to *as they can sell it*
But basically yeah.
They would still know you're using the internet at what time and from where
But the content they wouldn't know
pretty hard to trust VPNs that are inside five eyes as a result i suppose
Pretty hard to trust VPNs at all
true
it's all in degrees
Even if you rent a box and run openVPN on it, you're trusting that box provider
If you build your own machine and deploy it with openVPN then you're trusting the onsite security of that location
Then, you need to start looking into I2P and TOR
..and OS