What are some other ways of identifying a PC on the internet other than an IP address
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680
Rep:
Quote:
Originally Posted by punchy71
Yes, I primarily use a web-browser on my PC. Interesting website link you provided. It seems to check for unique or rare browser configurations. I guess that's one way to lose your anonymity is to use a highly customized web-browser configuration or rare web browser itself.
Hmm, if I wanted to blend in with John Q. Public I guess I should dump Linux altogether and go back to use Internet Explorer in a bone stock configuration on MS Winblows, ... (?!)..
Coincidentally there is an article in this month's 2600 regarding this and I feel like an idoit for forgetting: https://www.eff.org/privacybadger
If you don't already read 2600 then I would recomend taking a look at the online content at least. http://www.2600.org/
You can spoof any user-agent and it doesn't really get in the way (I will get random warnings every now and then about using a old version of IE and get confused before I remember I'm using it lol)
You can spoof any user-agent and it doesn't really get in the way (I will get random warnings every now and then about using a old version of IE and get confused before I remember I'm using it lol)
That only spoofs the user agent string though, which is only part of the battle. For that matter even the plugin I linked to doesn't prevent "browser fingerprinting" or IP address tracking.
The only "real" way to identify a computer is to use an encrypted connection with unique digital certificates at both ends. Anyone who succeeds in establishing a connection must be in possession of a certificate that can be traced uniquely to him. The crypto transport further assures that the messages will be received as-tendered.
VPN, of course, is a de facto method of doing this, which also has the advantage of being transparent to both parties. If properly secured (i.e. "don't use PSKs == passwords"), the tunnel is reliable but invisible. It can be implemented in hardware.
Last edited by sundialsvcs; 07-10-2015 at 08:08 AM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.