![]() |
#106 | |
Resident Curmudgeon
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 79,820
Karma: 146918083
Join Date: Nov 2006
Location: Roslindale, Massachusetts
Device: Kobo Libra 2, Kobo Aura H2O, PRS-650, PRS-T1, nook STR, PW3
|
Quote:
|
|
![]() |
![]() |
![]() |
#107 | |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 5,187
Karma: 25133758
Join Date: Nov 2008
Location: SF Bay Area, California, USA
Device: Pocketbook Touch HD3 (Past: Kobo Mini, PEZ, PRS-505, Clié)
|
Quote:
An IP address should be enough to get a warrant; the issue is copyright holders wanting to *bypass* the court system and issue expensive settlement options based on IP addresses. Recent judges have thrown them out, not so much for not having enough identity info, but for the fact that they obviously had no intention of prosecuting anything--they were hoping for a lot of settlement $ from people too busy or ashamed (in the case of porn accusations) to face them in court. If there's an actual crime or other violation with real damages involved, an IP address is certainly enough info to kick off a real investigation. Proving absolutely that this one person downloaded the fies may be impossible, but connecting usage logs to records on the hard drive can prove things beyond a resonable doubt. The problem isn't the courtroom standard of proof--it's that the RIAA and MPAA want to avoid having to meet legal standards before inflicting punishments. |
|
![]() |
![]() |
Advert | |
|
![]() |
#108 |
Fanatic
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 532
Karma: 3293888
Join Date: Oct 2011
Location: Virginia
Device: Nook Simple Touch
|
or a spoof of an authorized mac address. spoofing a mac is far easier than spoofing an ip.
|
![]() |
![]() |
![]() |
#109 |
Resident Curmudgeon
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 79,820
Karma: 146918083
Join Date: Nov 2006
Location: Roslindale, Massachusetts
Device: Kobo Libra 2, Kobo Aura H2O, PRS-650, PRS-T1, nook STR, PW3
|
|
![]() |
![]() |
![]() |
#110 | |
Wizard
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 1,854
Karma: 13432974
Join Date: Nov 2010
Device: Kobo Clara HD, iPad Pro 10", iPhone 15 Pro, Boox Note Max
|
Quote:
I wasn't agreeing with you, but at least sympathetic to your side until I read that... then you lost me. That's a load if I ever heard one. |
|
![]() |
![]() |
Advert | |
|
![]() |
#111 |
Autism Spectrum Disorder
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 1,212
Karma: 6244877
Join Date: Sep 2011
Location: Coastal Texas
Device: Android Phone
|
|
![]() |
![]() |
![]() |
#112 | |
Connoisseur
![]() Posts: 59
Karma: 98
Join Date: Apr 2009
Location: Sedona, AZ
Device: Sony T1, Nexus 7, Kindle Fire HD, Samsung Note 3
|
You can know the MAC address
Quote:
If you do not use wireless then I have several options depending on how much I want to use your IP address. If I were a casual user I would go to a neighbor with wireless. If I really wanted to use your IP address there are many ways to do so. Ask any college network admin how well they are able to enforce the one IP per dorm room drop policy. It is well known how to share an IP address provided by an ISP even without the help or knowledge of the owner of that IP address. The judge was correct. The ISP can only prove that traffic was sent to an IP address. Unless you have a goverment/military secure channel from end to end there is no way to prove who received that traffic. It could be the owner of that IP address, anyone who stole it or a completely different IP address because the orginal IP address was modified before it arrived at the destination. |
|
![]() |
![]() |
![]() |
#113 | |
Grand Master of Flowers
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 2,201
Karma: 8389072
Join Date: Oct 2010
Location: Naptown
Device: Kindle PW, Kindle 3 (aka Keyboard), iPhone, iPad 3 (not for reading)
|
Quote:
An IP address is decent evidence that the IP address holder was involved in whatever violation or crime is at issue. It's enough to get a warrant, or to issue a subpoena, or to take other steps to make sure that the address holder is actually the person who committed the violation. But it's not precise enough to allow you to avoid doing other due diligence. |
|
![]() |
![]() |
![]() |
#114 |
Fanatic
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 574
Karma: 5264318
Join Date: Jan 2012
Location: Belfast
Device: Sony T1, Note Pro 12.2, Honor 10
|
Ip address should never alone be enough to point fingers and accusations, I think every torrent client in existence has the option of which IP to send to the tracker, now while that's there to make incoming connections easier to establish it could easily be used to give any torrent any ip address you wanted and get people you don't like sued.
I'm sure someone could knock up a program in 20 minutes that does nothing but send other peoples Ip's to random infringing torrents. Then there the issues of the amount of hacker controlled botnets out in the wild I'm pretty sure lot's of innocent people are unknowingly infected and could easily have their computers used as proxys/bounces without their knowledge. As for wifi security it has never existed, mac addresses are easy to spoof and all of the current encryptions can be cracked pretty quickly by someone with a sniffer and the right rainbow tables. Even if you ignore all that how can you prove who was using the computer or if it was even at the address, I've even seen cable repair guys plugging their laptops into the cable box across the street and using peoples connections I presume they can do this at ISP level as well. |
![]() |
![]() |
![]() |
#115 | ||
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 5,187
Karma: 25133758
Join Date: Nov 2008
Location: SF Bay Area, California, USA
Device: Pocketbook Touch HD3 (Past: Kobo Mini, PEZ, PRS-505, Clié)
|
Quote:
If you find the gun used in a murder in the house of the guy who owns the gun, you have grounds to suspect him, and demand a lot of access to the details of his life while you find out what happened. You don't have grounds to declare him "probably guilty" or "guilty of SOMETHING since his gun was used" and assign penalties thereby. Quote:
Tracking exactly who-did-what online is not impossible (usually), but an IP address is only the starting point for that. |
||
![]() |
![]() |
![]() |
#116 |
Illiterate
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 10,279
Karma: 37848716
Join Date: Mar 2009
Location: The Sandwich Isles
Device: Samsung Galaxy S10+, Microsoft Surface Pro
|
IP addresses are assigned by the DHCP appliance at the ISP based on the MAC address of the modem. There is nothing preventing me from buying a cable modem from Best Buy, spoofing someone else’s MAC, and plugging it in to the cable network thus getting an IP that’s logged as whoever has that MAC. The only restriction is that the legitimate modem can’t be on line at the same time, but how many people stay on line 24/7? And I can tell if you’re on line with nothing more than a cell phone.
The IP address of a perpetrator is NOT evidence! That, by the way is the reason for the Enhanced 911 system, There is no way guarantee the location of a VOIP telephone, since it is connected to a routable network. Last edited by wodin; 05-04-2012 at 08:23 PM. |
![]() |
![]() |
![]() |
#117 |
Guru
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 895
Karma: 4383958
Join Date: Nov 2007
Device: na
|
edit: others already replied, no point duplicating those posts
![]() |
![]() |
![]() |
![]() |
#118 | |
Nameless Being
|
Quote:
|
|
![]() |
![]() |
#119 | |
Guru
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 895
Karma: 4383958
Join Date: Nov 2007
Device: na
|
Quote:
or read this one If you do not know who drove your car and took reasonable steps to try to find out, nothing will happen. Remember this discussion is not about someone who did speed trying to get out of the fine, it's about an owner of the car who didn't speed and didn't know who was driving the car/had not given anyone permission to. They cannot be charged with speeding (or rather won't be found guilty) unless the police can provide evidence that they were the driver at the time. Prooving it was your car isn't sufficient. Now if they really were driving, or they knew who was and the police later found out and could prove it, they're in a lot more trouble than if they'd just copped for the speeding ticket. However, again, we're talking about innocent car owners. Or rather, innocent router owners who have no idea that someone else used their connection let alone who it was. |
|
![]() |
![]() |
![]() |
#120 |
Illiterate
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 10,279
Karma: 37848716
Join Date: Mar 2009
Location: The Sandwich Isles
Device: Samsung Galaxy S10+, Microsoft Surface Pro
|
That only protects the private side, the public side is still wide open, and it’s the public IP address that is logged at the ISP.
|
![]() |
![]() |
![]() |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
360 Plus How to enter address into browser address field? | Hope | PocketBook | 15 | 04-06-2012 12:07 PM |
TheyRule.Net - relationships of the US ruling class | Alexander Turcic | Lounge | 0 | 05-13-2004 09:50 AM |