Jump to content

Vaccination cards.


Recommended Posts

^The United Nations is an intergovernmental organization that aims to maintain international peace and security. It does not necessarily mean that they'll do anything useful, in any way at all, but they will still be able to do something unlike...........   

They're quite unlikely to know just what the problem caused by COVID-16 is either. That's my thought, anyway

Edited by George.
Link to comment
Share on other sites

15 hours ago, Ghostrider said:

...if you're someone who only goes online at home, while the IP would lead back to a connection in a given locality eventually, there's no way of proving who was using it at the time...

That is, of course, completely ignoring the field of computer forensics.

Link to comment
Share on other sites

3 hours ago, George. said:

And it must be considered just what form of internet protocol address is prefered for correct usage. Public, private, static or dynamic? 

No IP Address is safe from prying eyes.   So, Happy Goldfish Bowl..  :ponders:

Like most people, you probably only have 1 actual IP Address at any one time.  The 'flavour' doen't matter as your 'fingerprints' are likely to be all over it.

For extra security(?) you could try a VPN, but even that has it's drawbacks.

Edited by Colin
Link to comment
Share on other sites

1 hour ago, Colin said:

GR is correct in so much as in a multi-user household, there is no way of proving beyond any reasonable doubt, just who it was was actually online...

Nope. While multi-device households complicate matters, once you've rooted a device you get to All The Logs - that's why I used the word "forensics". Router and DNS query logs are another thing nevermind what PCs keep track of (everything) themselves. If you dig long enough, you find dirt.

Link to comment
Share on other sites

2 hours ago, cicero said:

From all the posts it seems as if it is difficult to hide from the authorities and unless you are up to something why bother.

Privacy. Its none of their damn business what anybody is doing unless that person is up to no good.

Being spied and eavesdropped upon wherever you are is contrary to the basic principle of justice, 'innocent until proven guilty'.

Link to comment
Share on other sites

Vaccine passports or cards could get stolen, or forged.

Maybe the best thing could be to tattoo on barcodes, like in the Robert Rankin Brentford trilogy, or, to Microchip people like they do with dogs?

Folk will be clamouring to be microchipped so they can get into pubs, shops etc.

;)

 

Link to comment
Share on other sites

5 hours ago, Roachmill said:

Nope. While multi-device households complicate matters, once you've rooted a device you get to All The Logs - that's why I used the word "forensics". Router and DNS query logs are another thing nevermind what PCs keep track of (everything) themselves. If you dig long enough, you find dirt.

Nope.  Please read my post again, particularly the bit that says "there is no way of proving beyond any reasonable doubt, just who it was was actually online... "

Any machine can be made to reveal it's logs, but it cannot tell you who was in control(?) when they were generated.  All it has is a user name and password, and they could both be 'generic' for use by all.

 

 

Link to comment
Share on other sites

24 minutes ago, Colin said:

Any machine can be made to reveal it's logs, but it cannot tell you who was in control(?) when they were generated.  All it has is a user name and password, and they could both be 'generic' for use by all.

Many devices these days are equipped with biometrics or, at the very least, a camera. But never mind all that... you can be identified by your typing and mouse use apparently:

> Describing the patterns as “cognitive fingerprints”, the Iowa State team can identify users via their typing rhythms with very high accuracy – false acceptance and rejection rates of just 0.5%, Phys.org reports.

https://www.welivesecurity.com/2013/11/20/does-your-mouse-know-its-you-researchers-claim-patterns-can-fingerprint-users-and-lock-out-imposters/

Link to comment
Share on other sites

36 minutes ago, Colin said:

Nope.  Please read my post again, particularly the bit that says "there is no way of proving beyond any reasonable doubt, just who it was was actually online... "

Any machine can be made to reveal it's logs, but it cannot tell you who was in control(?) when they were generated.  All it has is a user name and password, and they could both be 'generic' for use by all.

 

 

As has been said, biometrics are all over the place now so try telling me "but you could chop someone's finger off and use that".

PIN codes, patterns and passwords *can* be shared but that's up to you if you're daft enough. Your choice. Logs will tell you all sorts besides biometrics such as device lock state, when that changed, LAN and WAN states and IP addresses (yes they can be spoofed but not by Joe Blogs) and all that info can be linked together with other devices. You can get a pretty clear picture of what was in use, when and by whom. By all means argue that's not 100% guaranteed to nail an individual every time if you like... but it's way more difficult to be completely obscured than people think.

I've spent more time than is healthy sifting through all sorts of low level system logs and watching messaging buses to come to this opinion. If most criminals are caught due to mistakes... try maintaining a lie when you're up against devices that log when you fart and look sideways.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

×
×
  • Create New...