View Single Post
  #252 (permalink)  
Old May 26th, 2008
AaronWalkhouse's Avatar
AaronWalkhouse AaronWalkhouse is offline
***ּLegendary Axeman***ּ
 
Join Date: January 17th, 2005
Location: My igloos melt in June.
Posts: 1,974
AaronWalkhouse is a great assister to others; your light through the dark tunnel
Default

This quote is what I am replying to, not the rest of his post.
Quote:
Originally Posted by Orange County Ca
And if I want my enemy to get arrested all I have to do is buy his old but registered computer, not change the address, download and share CP then watch the cops fruitlessly raid his home.

I actually hope I'm wrong on all this, that my privacy can't be invaded that easily but with the web site I referred to the scenario is realistic. Show me how I'm wrong. Please
ISP's do work with MAC addresses and assign IP addresses to MAC
addresses as they are found on the network. Telus, for example, allows advanced
users to manually register two MAC addresses for each DSL account.

So, in order to impersonate another user on a typical broadband connection you
need three things, the right MAC address, physical access to the same line and
the opportunity to use both of those quickly enough to fool the ISP and any
potential investigators. The odds are strongly against it and the risk of being
caught in the attempt is high. It could also be done if the victim has an unsecured
wireless router but that circumstance also gives said victim a plausible defence.
Reply With Quote